Tageszusammenfassung - 13.01.2026

End-of-Day report

Timeframe: Montag 12-01-2026 18:00 - Dienstag 13-01-2026 18:00 Handler: Felician Fuchs Co-Handler: n/a

News

Targets dev server offline after hackers claim to steal source code

Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platform. After BleepingComputer notified Target, the files were taken offline and the retailers developer Git server was inaccessible.

https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/

CISA orders feds to patch Gogs RCE flaw exploited in zero-day attacks

CISA has ordered government agencies to secure their systems against a high-severity Gogs vulnerability that was exploited in zero-day attacks.

https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/

Facebook login thieves now using browser-in-browser trick

Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials.

https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/

Convincing LinkedIn comment-reply tactic used in new phishing

Scammers are flooding LinkedIn posts with fake "reply" comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIns official lnkd.in shortener, making the phishing attempts harder to spot.

https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/

What we know about Iran-s Internet shutdown

Cloudflare Radar data shows Internet traffic from Iran has effectively dropped to zero since January 8, signaling a complete shutdown in the country and disconnection from the global Internet.

https://blog.cloudflare.com/iran-protests-internet-shutdown/

GoBruteforcer Botnet Targets 50K-plus Linux Servers

Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.

https://www.darkreading.com/threat-intelligence/gobruteforcer-botnet-targets-50k-plus-linux-servers

10-Punkte-Papier: BDEW fordert Maßnahmen zum Schutz kritischer Infrastruktur

In einem Positionspapier fordert der Bundesverband der Energie- und Wasserwirtschaft die Stärkung der Resilienz kritischer Infrastrukturen.

https://www.golem.de/news/10-punkte-papier-bdew-fordert-massnahmen-zum-schutz-kritischer-infrastruktur-2601-204140.html

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers OAuth credentials.

https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access.

https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink thats specifically designed for long-term, stealthy access to Linux-based cloud environments.

https://thehackernews.com/2026/01/new-advanced-linux-voidlink-malware.html

Businesses in 2026: Maybe we should finally look into that AI security stuff

Survey finds security checks nearly doubled in a year as leaders wise up. The number of organizations that have implemented methods for identifying security risks in the AI tools they use has almost doubled in the space of a year.

https://www.theregister.com/2026/01/12/ai_security_wef_survey/

Mandiant open sources tool to prevent leaky Salesforce misconfigs

AuraInspector automates the most common abuses and generates fixes for customers Mandiant has released an open source tool to help Salesforce admins detect misconfigurations that could expose sensitive data.

https://www.theregister.com/2026/01/13/mandiant_salesforce_tool/

Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam

33-year-old was under surveillance for some time before returning home from the UAE Dutch police believe they have arrested a man behind the AVCheck online platform - a service used by cybercrims that Operation Endgame shuttered in May.

https://www.theregister.com/2026/01/13/avcheck_arrest/

Start der ersten ESC-Ticketwelle: Vorsicht vor unseriösen Angeboten!

Endlich ist es so weit: Der Vorverkauf für den Eurovision Song Contest 2026 hat begonnen! Doch Fans sollten besonders vorsichtig sein, denn unseriöse Anbieter versuchen, außerhalb der offiziellen Verkaufsplattformen Profit zu schlagen.

https://www.watchlist-internet.at/news/start-der-ersten-esc-ticketwelle-vorsicht-vor-unserioesen-angeboten/

Neue Phishing-Welle: Ausstehende Zahlungen ans Finanzamt

Einmal mehr geben sich Kriminelle als das Bundesministerium für Finanzen aus. Aktuell nehmen sie sowohl Privatpersonen als auch Unternehmen ins Visier. In beiden Fällen sollen angeblich offene Zahlungen mit einer Überweisung beglichen werden - auf ein Konto im Ausland.

https://www.watchlist-internet.at/news/phishing-ausstehende-zahlungen-finanzamt/

Latin America Sees Sharpest Rise in Cyber Attacks in December 2025 as Ransomware Activity Accelerates

In December 2025, organizations experienced an average of 2,027 cyber attacks per organization per week. This represents a 1% month-over-month increase and a 9% year-over-year increase. While overall growth remained moderate, Latin America recorded the sharpest regional increase, with organizations experiencing an average of 3,065 attacks per week, a 26% increase year over year.

https://blog.checkpoint.com/research/latin-america-sees-sharpest-rise-in-cyber-attacks-in-december-2025-as-ransomware-activity-accelerates/

VoidLink: The Cloud-Native Malware Framework Weaponizing Linux Infrastructure

Key Points: VoidLink is a cloud-native Linux malware framework built to maintain long-term, stealthy access to cloud infrastructure rather than targeting individual endpoints. It reflects a shift in attacker focus away from Windows systems toward the Linux environments that power cloud services and critical operations. Its modular, plug-in-driven design allows threat actors to customize capabilities over time, expanding attacks quietly as objectives evolve.

https://blog.checkpoint.com/research/voidlink-the-cloud-native-malware-framework-weaponizing-linux-infrastructure/

Sweden detains ex-military IT consultant suspected of spying for Russia

A 33-year-old former IT consultant for Sweden-s Armed Forces has been detained on suspicions of spying for Russian intelligence, Swedish prosecutors said.

https://therecord.media/sweden-detains-it-consultant-russia

0patch Micropatch für CredSSP-Schwachstelle CVE-2025-47987

Noch ein kleiner Nachtrag von letzter Woche und vor dem Januar 2026 Patchday. ACROS Security hat einen 0patch Micropatch für eine Elevation of Privilege (EoP)-Schwachstelle CVE-2025-47987 im Credential Security Support Provider Protocol (CredSSP) veröffentlicht.

https://borncity.com/blog/2026/01/13/0patch-micropatch-fuer-credssp-schwachstelle-cve-2025-47987/

End of Support für Microsoft-Produkte in 2026

Das Jahr 2026 bringt für Nutzer von Microsoft Produkten einige Termine, an denen der Support endet. Das reicht von diversen Windows-Versionen, die dann nicht mehr durch Updates unterstützt werden, bis hin zu Microsoft Office 2021.

https://borncity.com/blog/2026/01/13/end-of-support-fuer-microsoft-produkte-in-2026/

Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds

New research from Recorded Future reveals how Russian state hackers (BlueDelta) are using fake Microsoft and Google login portals to steal credentials. The campaign involves using legitimate PDF lures from GRC and EcoClimate to trick victims.

https://hackread.com/russian-bluedelta-fancy-bear-pdfs-steal-login/

Widespread Magecart Campaign Targets Users of All Major Credit Cards

Researchers at Silent Push have exposed a global Magecart campaign stealing credit card data since 2022. Learn how this invisible web-skimming attack targets major networks like Mastercard and Amex, and how to stay safe.

https://hackread.com/magecart-targets-all-credit-cards-users/

K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation (CVE-2025-67826)

When hunting for privilege escalation vulnerabilities, named pipes are a goldmine. Antivirus products often use named pipes to allow unprivileged users to trigger privileged operations, making them especially promising targets for this class of vulnerability.

http://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html

How GitHub could secure npm

In 2025, npm experienced an unprecedented number of compromised packages in a series of coordinated attacks on the JavaScript open source supply chain. These packages ranged from crypto-stealing malware1 to credential-stealing exploits2. While GitHub announced changes3 to address these attacks, many maintainers (myself included) found the response insufficient.

https://humanwhocodes.com/blog/2026/01/how-github-could-secure-npm/

Shai Hulud 2.0 Campaign

Shai-Hulud 2.0 represents one of the most severe supply chain compromises observed in the modern cloud-native ecosystem. The campaign involved the manipulation of hundreds of publicly available packages and specifically targeted developer workstations, CI/CD pipelines, and cloud workloads to harvest credentials and sensitive configuration data.

https://detect.fyi/shai-hulud-2-0-campaign-be390e502f28?source=rssd5fd8f494f6a4

Malicious Chrome Extension Steals MEXC API Keys for Account Takeover

Socket-s Threat Research Team identified a malicious Chrome extension, MEXC API Automator, published to the Chrome Web Store on September 1, 2025, by a threat actor under the alias jorjortan142.

https://socket.dev/blog/malicious-chrome-extension-steals-mexc-api-keys?utm_medium=feed

Fixing ESC1 - Enrollee supplies subject and template allows client authentication

ADCS misconfigurations are one of the most common privilege escalation vectors we encounter. This article covers steps to remediate ESC1 flaws.

https://projectblack.io/blog/fixing-esc1-enrollee-supplies-subject-and-template-allows-client-authentication/

Lack of isolation in agentic browsers resurfaces old vulnerabilities

With browser-embedded AI agents, we-re essentially starting the security journey over again. We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from the dissemination of false information to cross-site data leaks.

https://blog.trailofbits.com/2026/01/13/lack-of-isolation-in-agentic-browsers-resurfaces-old-vulnerabilities/

Vulnerabilities

Unauthenticated access to local configuration

CVSSv3 Score: 9.3. An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiFone Web Portal page may allow an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.

https://fortiguard.fortinet.com/psirt/FG-IR-25-260

Unauthenticated remote command injection

CVSSv3 Score: 9.4. An improper neutralization of special elements used in an OS command (OS Command Injection) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests.

https://fortiguard.fortinet.com/psirt/FG-IR-25-772

SAP Security Patch Day January 2026

SAP has released its January 2026 security patch package containing 17 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes four HotNews vulnerabilities with CVSS ratings up to 9.9, four High priority issues, seven Medium priority fixes, and two Low priority updates. The patches affect SAP S/4HANA, SAP HANA database, SAP NetWeaver, SAP Wily Introscope, and various application components.

https://redrays.io/blog/sap-security-patch-day-january-2026/

TinyWeb: Windows-Web-Server ermöglicht Codeschmuggel

In dem schlanken Web-Server TinyWeb für Windows können Angreifer aus dem Netz beliebigen Code einschleusen. Ein Update hilft.

https://www.heise.de/news/TinyWeb-Windows-Web-Server-ermoeglicht-Codeschmuggel-11138924.html

TYPO3-CORE-SA-2026-003: Broken Access Control in Recycler Module

It has been discovered that TYPO3 CMS is susceptible to broken access control.

https://typo3.org/security/advisory/typo3-core-sa-2026-003

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0.

https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html

Security updates for Tuesday

Security updates have been issued by AlmaLinux (mariadb10.11, mariadb:10.11, mariadb:10.3, mariadb:10.5, and tar), Debian (net-snmp), Fedora (coturn, NetworkManager-l2tp, openssh, and tuxanci), Mageia (libtasn1), Oracle (buildah, cups, httpd, kernel, libpq, libsoup, libsoup3, mariadb:10.11, mariadb:10.3, openssl, and podman), SUSE (cpp-httplib, ImageMagick, libtasn1, python-cbor2, util-linux, valkey, and wget2), and Ubuntu (google-guest-agent, linux-iot, and python-urllib3).

https://lwn.net/Articles/1053988/

Remote Code Execution With Modern AI/ML Formats and Libraries

We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA.

https://unit42.paloaltonetworks.com/rce-vulnerabilities-in-ai-python-libraries/

YoSmart YoLink Smart Hub

https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-03

Rockwell Automation FactoryTalk DataMosaix Private Cloud

https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-02

Rockwell Automation 432ES-IG3 Series A

https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-01

Security Vulnerabilities fixed in Firefox 147

https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/