Back to Feed
Threat IntelligenceMay 8, 2026

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

SecurityWeek roundup: US targets 72-hour patch cycles, PamDOORa Linux backdoor, CISA director frontrunner named.

Summary

A weekly cybersecurity news roundup covering multiple critical developments: US government proposes reducing federal patch timelines from 14 days to 72 hours for critical vulnerabilities amid faster AI-driven exploitation. Cisco Talos identifies CloudZ malware leveraging Windows Phone Link to steal OTPs and SMS messages. Additional stories include a train network hacker arrested in Taiwan, IBM executive Tom Parker emerging as CISA director candidate, and a Eurasian drone industry spy campaign targeting forum attendees.

Full text

SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader threat landscape. This curated summary highlights key stories across vulnerability disclosures, emerging attack methods, policy updates, industry reports, and other noteworthy events to help readers maintain a well-rounded awareness of the evolving cybersecurity environment. Here are this week’s highlights: US government targets 72-hour patch cycles US cybersecurity officials are proposing a significant reduction in federal remediation timelines, moving from a 14-day window to just three days for critical vulnerabilities, Reuters learned. This shift is driven by the rise of sophisticated AI models like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber, which allow attackers to weaponize software flaws at unprecedented speeds. It’s worth noting that CISA even now instructs federal agencies to patch some vulnerabilities within three days if the risk of exploitation is significant. Malware leverages Windows Phone Link to steal OTPsAdvertisement. Scroll to continue reading. Cisco Talos has identified a modular malware campaign featuring the CloudZ remote access tool and a new plugin named Pheno. This threat intercepts one-time passwords and SMS messages by targeting the Microsoft Phone Link application to extract data from synchronized SQLite databases on the host PC. The infection chain utilizes a Rust-compiled loader and reflective .NET execution to bypass detection mechanisms. Another Venezuelan ATM jackpotter to be deported Venezuelan national David Jose Gomez Cegarra was sentenced to time served for his role in an ATM jackpotting operation that stole nearly $300,000 from several banks. The group bypassed security by physically accessing ATM hard drives to install malware, allowing them to trigger cash dispensations. Following his conviction for bank larceny, Cegarra was ordered to pay $294,000 in restitution and was transferred to ICE for deportation. Train hacker arrested in Taiwan A 23-year-old student has been detained in Taiwan for allegedly infiltrating the high-speed rail network and transmitting fake General Alarm signals to the control center. By cloning Tetra radio signals to trigger manual emergency braking, the suspect forced several trains to stop. Authorities seized multiple radio and electronic devices during the investigation, and the suspect now faces several charges, including interference with public transportation safety. IBM security executive positioned as frontrunner for CISA director Tom Parker, a security services lead at IBM, has surfaced as a primary candidate to lead the Cybersecurity and Infrastructure Security Agency (CISA) following the withdrawal of Sean Plankey. The Trump administration reportedly favors Parker’s extensive private sector background, which includes founding Hubble. If appointed, he will take over the agency currently overseen by acting director Nick Andersen. Drone forum participants targeted in Eurasian spy operation Researchers have identified a targeted spy operation called Operation Silent Rotor aimed at the Eurasian drone industry. Attackers used spear-phishing emails disguised as orders from the Russian Aeronautical Information Center to trick victims into running malware that steals data. The campaign was specifically timed to hit attendees of the Unmanned Aviation 2026 forum in Moscow, allowing the hackers to compromise high-value targets in the sector. More US residents imprisoned for operating North Korean laptop farms Matthew Isaac Knoot and Erick Ntekereze Prince were each sentenced to 18 months in prison for enabling North Korean IT workers to infiltrate nearly 70 US companies and generate $1.2 million for the sanctioned regime. The defendants hosted corporate laptops at their homes and installed unauthorized remote access software to create the illusion that the overseas workers were operating from within the United States. Gaming platform exploited in North Korean spy campaign The North Korea-linked threat actor ScarCruft conducted targeted surveillance against users in the Yanbian region of China by compromising a video game platform used by ethnic Koreans living there. By trojanizing Windows update files and Android game packages, the group deployed the BirdCall backdoor to exfiltrate personal documents and record audio from victim devices. New Linux backdoor PamDOORa A threat actor known as ‘darkworm’ is marketing the source code for PamDOORa, a sophisticated post-exploitation tool designed to compromise the Linux Pluggable Authentication Module (PAM) stack. This backdoor enables persistent SSH access while simultaneously harvesting plaintext credentials from legitimate users, potentially even from incident responders. The malware is currently being offered on a Russian cybercrime forum for $900. Hard power cycles required to eradicate Firestarter implant from Cisco firewalls The ArcaneDoor cyber espionage group is using a persistent Linux-based malware called Firestarter to compromise Cisco firewalls. According to Eclypsium, this implant hooks the core LINA process to evade detection and remains active even after firmware patches by re-installing its persistence mechanism during the system’s reboot sequence. Performing a hard power cycle by physically disconnecting the hardware from all power sources for at least one minute is needed to fully purge the infection. Related: In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability Related: In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device Written By SecurityWeek News More from SecurityWeek News In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App FlawsWebinar Today: ROI for Cyber-Physical Security ProgramsExaforce Raises $125 Million for Agentic SOC PlatformWebinar Today: Securing Identity Across Humans, Machines and AIAutonomous Offensive Security Firm XBOW Raises $35 MillionIn Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability Webinar Today: A Step-by-Step Approach to AI GovernanceIn Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device Latest News Caught Off Guard: Securing AI After It Hits ProductionReal-World ICS Security Tales From the TrenchesVirtual Event Today: Threat Detection & Incident Response SummitGitHub Confirms Hack Impacting 3,800 Internal RepositoriesVerizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach VectorDrupal to Patch Highly Critical Vulnerability at Risk of Quick ExploitationMicrosoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’ Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Caught Off Guard: Securing AI

Indicators of Compromise

  • malware — CloudZ
  • malware — Pheno

Entities

Cisco (vendor)Microsoft (vendor)IBM (vendor)CISA (vendor)Windows Phone Link (product)Operation Silent Rotor (campaign)