Cybersecurity News Roundup: Supply Chain Risks, Spyware, and Enforcement Actions 

Published
Written by:
Vishwa Pandagle
Vishwa Pandagle
Cybersecurity Staff Editor

Where systems operate at scale, there is a supply chain. It surfaced repeatedly as the entry point across incidents. The Itron incident showed a breach contained before reaching operational infrastructure.

Activity relied on everyday user actions rather than complex exploits. Surveillance and spyware efforts continue to focus on user behavior, using fake apps and messages to gain access and monitor activity.

Fake Android Apps Spread Morpheus Spyware Linked to Italian Vendor

A surveillance campaign has been uncovered distributing Morpheus malware through fake Android app updates that trick users into installing malicious software. The operation was identified by Osservatorio Nessuno, which linked the spyware to IPS Intelligence, an Italian surveillance vendor. Victims receive deceptive SMS messages posing as telecom providers, prompting them to download a supposed network recovery app. Once installed, the malware abuses Android accessibility features to monitor activity, execute commands, and manipulate device functions without detection. It then overlays fake biometric prompts to capture user authentication and link unauthorized devices to WhatsApp accounts.

Itron Contains Internal Network Breach With No Impact on Critical Infrastructure

Itron disclosed a cybersecurity incident involving unauthorized access to parts of its internal IT network, detected on April 13, 2026. The company confirmed the intrusion was limited to specific internal systems and did not extend into operational technology or customer environments. Systems supporting electricity, gas, and water distribution remained unaffected across its global infrastructure footprint. Itron activated its incident response protocols immediately, contained the unauthorized activity, and blocked further access. External forensic specialists and law enforcement were engaged to investigate the breach and assess any residual risk. The company stated that core operations continued without disruption and no threat actor has claimed responsibility.

Global Server Breach Operation Faces US Prosecution 

Alleged hacker Xu Zewei has been extradited to the United States to face charges tied to a large-scale operation exploiting Microsoft Exchange Server vulnerabilities. Prosecutors say he was part of a group that infiltrated thousands of systems worldwide between 2020 and 2021. The intrusions enabled attackers to deploy web shells, allowing persistent remote access to compromised networks. Targets included U.S. universities and research institutions working on COVID-19-related projects. Investigators allege that sensitive data and internal communications were accessed during the campaign. Xu was arrested in Italy in July 2025 before being transferred to the U.S. to face multiple charges.

Unpatched ClickUp API Key Leak Leaves Corporate And Government Emails

A hardcoded API key in ClickUp’s public code exposed hundreds of corporate and government email addresses and remained unpatched for over a year after disclosure. The prolonged exposure raises concerns about delayed remediation of preventable security flaws in widely used enterprise tools. Because the data includes employees from security firms and government entities, the leak creates a clear pathway for targeted phishing and follow-on attacks. The incident also shows how a single coding oversight can scale into a broad organizational risk when left unresolved. The presence of internal feature flags alongside emails further reveals insights into product development and system configurations.

Privacy Fines Surge As Companies Bear Cost Of Data Failures

Privacy fines crossed $3.4 billion in 2025, with regulators increasingly going after how companies handle data rather than just the breaches themselves. What stands out is the split between who causes the damage and who pays for it. Attackers are still the ones exploiting systems and exposing data, but regulators are holding companies accountable for how that data was collected, stored, and protected in the first place. A lot of these penalties are tied to misuse in AI-driven systems and weak data governance, not just security failures. It’s turning into a pattern where breaches may start externally, but the financial impact lands on the organizations responsible for the data.

Europol-Backed Operation Targets Black Axe Network In Switzerland

Swiss authorities, supported by Europol and German law enforcement, have arrested 10 suspected members of the Black Axe criminal network following coordinated raids across multiple cantons. The operation, carried out on April 28, targeted both leadership and operational members, including the group’s regional head for Southern Europe. Investigators linked the suspects to cyber-enabled fraud schemes such as romance scams, which caused losses worth millions of Swiss francs, along with large-scale money laundering. Black Axe, a globally distributed and highly structured organization, operates through decentralized cells and relies on money mules and cross-border financial channels to move illicit funds.

Checkmarx Confirms Data Theft Following Supply Chain Compromise

Checkmarx has confirmed that data was exfiltrated after attackers breached its environment through a compromised third-party component used in development workflows. The intrusion began with the open-source Trivy scanner and extended into Checkmarx’s GitHub systems, where malicious changes were introduced into build and distribution processes. Several developer-facing assets, including GitHub Actions and related tools, were affected during the incident. The same access enabled attackers to extract data and interact with internal repositories before the activity was contained. The breach adds to a growing list of incidents where compromises in widely used development dependencies ripple into vendor environments and downstream users.

Scam Compounds Expose Human Trafficking Layer Behind Global Crypto Fraud

The Dubai takedown reveals less about crypto scams and more about how these operations are being run like controlled environments, where workers are recruited, managed, and in some cases coerced into carrying out fraud campaigns. Victims are not just the investors losing money but also individuals inside these compounds who are trained or pressured to execute scripted scams at scale. The structure mirrors call centers, with roles split across outreach, trust-building, and fund extraction, turning fraud into a repeatable process. The involvement of multiple countries in the crackdown points to how these operations rely on cross-border movement of both money and people. The case shifts the focus from financial loss to the underlying system that sustains large-scale, human-driven cyber fraud.

Ukraine Arrests Hackers Behind Massive Roblox Account Theft Scheme

Ukrainian police have detained three suspects linked to a large-scale operation that compromised more than 600,000 Roblox accounts and sold them online. The group used malware disguised as game tools to steal login credentials, then filtered and resold high-value accounts containing virtual currency and rare digital assets. What looks like gaming fraud at the surface reveals a structured economy, where stolen accounts are treated as inventory and traded for real money through underground marketplaces. Roblox accounts are not just profiles but containers of financial value, user identity, and in some cases income streams for creators. The case shows how platforms built for entertainment are now functioning as targets for organized cybercrime, with real-world financial impact at scale.

CISA Flags Actively Exploited WordPress-Linked cPanel Vulnerability

CISA has added CVE-2026-41940, a missing authentication vulnerability affecting WebPros cPanel & WHM and its WP2 (WordPress Squared) feature, to its Known Exploited Vulnerabilities catalog following evidence of active attacks. The flaw allows unauthorized access to critical functions, making it a high-risk entry point for threat actors targeting web hosting and WordPress management environments. The update, issued April 30, requires U.S. federal agencies to remediate the vulnerability within mandated timelines under Binding Operational Directive 22-01. By including a vulnerability tied to WordPress management tooling, the move highlights ongoing risks in widely deployed web ecosystems. CISA’s action reinforces the need for immediate patching of actively exploited flaws rather than relying solely on severity-based prioritization.

Ransomware Case Turns Inward As U.S. Security Professionals Jailed For BlackCat Attacks

Two U.S. cybersecurity professionals have been sentenced for carrying out ransomware attacks using the BlackCat (ALPHV) platform against multiple American organizations. The pair, who had backgrounds in incident response, used their understanding of enterprise defenses to identify targets and execute extortion campaigns. One attack led to a seven-figure ransom payment in cryptocurrency, underscoring how insider knowledge can sharpen attack impact. The case stands out because it blurs the line between defenders and attackers within the ransomware ecosystem. It also raises concerns around how access, trust, and operational knowledge within security roles can be repurposed for high-impact attacks.

UK Flags ‘Patch Tsunami’ Risk As AI Speeds Up Vulnerability Discovery

The UK’s NCSC has warned of a surge in security patches as AI accelerates vulnerability discovery. The time between flaw discovery and exploitation is shrinking, reducing response windows for defenders. The volume of vulnerabilities is increasing, making patching a continuous operational task. AI is enabling both defenders and attackers to identify weaknesses faster at scale. The warning points to growing pressure on organizations to prioritize patching based on active exploitation rather than severity alone.

France Probes Teen Suspect Linked To Hack Of National ID Agency

French authorities are investigating a teenager in connection with a cyberattack targeting the National Agency for Secure Documents (ANTS), which manages passports, national IDs, and driver’s licenses. The breach, detected in mid-April, may have exposed personal data from millions of user accounts, including names, emails, and birth details. Officials said the compromised data does not allow direct access to accounts but increases risks of phishing and identity-based fraud. The suspected attacker is believed to have accessed internal systems, though the method and full scope remain under investigation.

Breached By Attackers, Borne By Enterprises

Breaches are carried out by attackers, suffered by victims, and often compensated by the enterprises that hold the data. We witnessed high-profile takedowns and law enforcement actions, from Ukraine detaining actors behind large-scale account theft to coordinated operations dismantling scam compounds in Dubai, and ongoing investigations tied to France’s national ID systems. 

The volume and spread of these actions point to how deeply embedded cybercrime operations are and the effort required globally to keep pace.  


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: