CISO Security Intel

Real-world exploitation of firmware and application zero-days, plus targeted campaigns against infrastructure and payment systems

Real-world exploitation of firmware and application zero-days, plus targeted campaigns against infrastructure and payment systems

Active Exploits, Zero-Days, and Sector Campaigns

Recent developments in cybersecurity highlight an alarming escalation in the exploitation of firmware and application zero-days, targeting critical infrastructure, payment systems, and enterprise networks. Attackers are leveraging sophisticated vulnerabilities and supply chain malware campaigns to compromise devices and software, with far-reaching operational and financial consequences.

Firmware and Device Zero-Day Exploits

One prominent example involves CVE-2024-10938, a severe embedded malicious code vulnerability found in moneytigo OVRI payment software. This flaw, assigned a CWE-506 classification, allows attackers to embed malicious code within payment processing systems, enabling data manipulation, theft, or persistent backdoors. Such supply chain compromises threaten not only individual financial institutions but the entire payment ecosystem, risking systemic failures and eroding consumer trust.

Similarly, CVE-2026-3379, a buffer overflow vulnerability in Tenda’s F453 routers, is actively being exploited. Threat actors are scanning for vulnerable routers, which are increasingly targeted as initial footholds within enterprise and operational technology (OT) environments. The exploitation of such network devices can lead to lateral movement, network disruption, or deeper intrusions into critical infrastructure.

Adding to the threat landscape, recent reports reveal firmware-level backdoors and zero-day exploits in widely used devices like Android tablets and Dell hardware. For instance, Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 2024 underscores how malicious actors are increasingly focusing on embedded firmware to bypass traditional security measures and establish persistent footholds.

Targeted Campaigns and Operational Disruptions

Advanced threat actors are conducting targeted campaigns that exploit these vulnerabilities. In February 2026, the DragonForce ransomware group launched a widespread attack on Aegis Project Controls, encrypting critical data and disrupting operations. This campaign exemplifies a disturbing trend: adversaries are not only seeking financial gains but also aiming to cause operational chaos by targeting operational technology and project-critical systems.

The Lazarus Group, a North Korean state-sponsored actor, has expanded its arsenal with Medusa ransomware, further demonstrating the convergence of nation-state interests and financially motivated operations. These campaigns often employ AI-driven reconnaissance and exploitation tools to rapidly identify vulnerabilities, automate attack deployment, and scale their operations within hours.

The Role of AI in Attack and Defense

AI-powered automation plays a central role on both sides of the cyber battlefield. Malicious actors utilize AI tools like OpenClaw to autonomously discover vulnerabilities, develop exploits, and orchestrate attacks with unprecedented speed. For example, AI-assisted reconnaissance accelerates vulnerability scanning for devices like FortiGate firewalls, enabling mass exploitation within minutes.

Conversely, cybersecurity defenses are increasingly adopting AI-driven threat hunting, anomaly detection, and automated response systems. Platforms such as Glean and Palo Alto Networks emphasize that AI-enabled security solutions significantly enhance the ability to detect and respond to sophisticated, automated attacks. However, the proliferation of action-capable AI underscores the need for secure-by-design AI systems, continuous oversight, and adaptive security architectures.

Implications and Mitigation Strategies

The ongoing exploitation of firmware and application zero-days, coupled with supply chain malware campaigns like moneytigo OVRI, demands a multi-layered and proactive security posture:

  • Rapid patching of vulnerabilities such as CVE-2024-10938 and CVE-2026-3379, utilizing automated patch management tools to close attack vectors swiftly.
  • Strengthening supply chain security through rigorous vendor vetting, software integrity checks, and secure firmware update processes to prevent malicious code insertion.
  • Network segmentation and defense-in-depth strategies, especially within OT and IoT environments, to contain breaches and limit lateral movement.
  • Deployment of AI-aware detection platforms capable of identifying subtle anomalies and enabling autonomous response.
  • Monitoring payment and transaction systems for signs of embedded malware or data manipulation, leveraging threat intelligence feeds like VulnCheck and CYFIRMA to prioritize vulnerabilities and detect indicators of compromise in real time.

A critical insight from recent intelligence indicates that cybercriminals are increasingly breaching identities rather than just systems. Compromised credentials allow adversaries to bypass perimeter defenses, escalate privileges, and access sensitive infrastructure. This underscores the importance of robust Identity and Access Management (IAM) and continuous credential monitoring.

Looking Forward

The cyber threat environment in 2026 is characterized by speed, automation, and sophistication. The active exploitation of high-severity vulnerabilities and supply chain malware campaigns pose a pressing challenge for organizations across sectors—including critical infrastructure, healthcare, and financial systems. To counter these threats, organizations must adopt real-time threat intelligence integration, automated patching, and identity-centric security measures.

Failure to adapt risks catastrophic operational, financial, and reputational damage. The convergence of firmware vulnerabilities, supply chain malware, and AI-driven attack automation necessitates a comprehensive, layered security approach. Organizations that prioritize agile defenses, proactive threat hunting, and secure supply chain practices will be better positioned to withstand the relentless wave of cyber threats in 2026.

Sources (14)
Updated Mar 1, 2026
Real-world exploitation of firmware and application zero-days, plus targeted campaigns against infrastructure and payment systems - CISO Security Intel | NBot | nbot.ai