Weekly review

ThreatNoir Morning Brief — April 30

2026-04-30Morning4 articles
Audio
Listen to the episode

Morning Review in IT Security — April 30, 2026

The cybersecurity landscape continues to face significant threats across multiple domains this morning, with critical vulnerabilities emerging in widely-deployed software and fresh evidence of sophisticated supply-chain attacks targeting developer ecosystems. Organizations are urged to prioritize patching efforts and review their dependency chains as threat actors demonstrate increasing sophistication in compromising trusted infrastructure.

Official SAP npm packages compromised to steal credentials

Multiple official SAP npm packages have been compromised in what researchers believe to be a TeamPCP supply-chain attack designed to steal credentials and authentication tokens from developers' systems. The attack leverages the trust developers place in official package repositories, making this a particularly dangerous vector for widespread compromise. Source: Official SAP npm packages compromised to steal credentials

The compromised packages contained malicious code including execution.js and setup.mjs, which would execute during installation and exfiltrate sensitive authentication data from affected developer machines. This type of supply-chain compromise poses a cascading risk, as developers using these packages may unknowingly distribute further compromises to their own projects and downstream users.

Popular WordPress redirect plugin hid dormant backdoor for years

The Quick Page/Post Redirect plugin, which is installed on more than 70,000 WordPress sites, contained a dormant backdoor that was added five years ago and allows attackers to inject arbitrary code into affected websites. The long period during which this backdoor remained undetected highlights the challenge of identifying malicious code hidden within trusted plugins. Source: Popular WordPress redirect plugin hid dormant backdoor for years

The backdoor infrastructure utilized domains anadnet.com and w.anadnet.com for command and control purposes. Site administrators using this plugin should immediately update to a patched version and conduct thorough audits of their WordPress installations for signs of unauthorized code injection or suspicious activity.

cPanel, WHM emergency update fixes critical auth bypass bug

A critical vulnerability affecting all but the latest versions of cPanel and the WebHost Manager dashboard could allow attackers to obtain control panel access without authentication. The severity of this flaw prompted an emergency update release from the vendor, as the authentication bypass could grant complete administrative access to affected hosting control panels. Source: cPanel, WHM emergency update fixes critical auth bypass bug

Hosting providers and system administrators managing cPanel or WHM instances should treat this update as an immediate priority, as unauthenticated access to these dashboards can lead to complete server compromise and potential lateral movement throughout hosted environments.

Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

Unit 42 has published research revealing how multi-agent AI systems can autonomously attack cloud environments, demonstrating critical insights and vital lessons for organizations seeking to implement proactive security measures. The research examines the capabilities and limitations of AI-driven attack systems in cloud infrastructure scenarios. Source: Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

The findings underscore the evolving threat landscape where artificial intelligence is being weaponized to conduct sophisticated, autonomous attacks against cloud infrastructure. Organizations should review their cloud security postures and consider how AI-driven threats may circumvent traditional detection and response mechanisms.

As the threat landscape continues to evolve with increasingly sophisticated attack methodologies and supply-chain compromises, security teams must maintain vigilance across multiple fronts. Immediate patching of critical vulnerabilities, careful vetting of dependencies, and proactive monitoring for indicators of compromise remain essential defensive practices in today's threat environment.

Sources & IOCs

Source articles and extracted indicators (defanged where appropriate).

Official SAP npm packages compromised to steal credentials
Malware3
  • setup.mjs
    Malicious loader script in compromised packages that downloads Bun runtime
  • execution.js
    Obfuscated information-stealer payload that exfiltrates credentials and secrets
  • TeamPCP
    Threat actor attributed to this and previous supply-chain attacks (Bitwarden, Checkmarx, Trivy)