Weekly review

ThreatNoir Afternoon Brief — May 18

2026-05-18Afternoon4 articles
Audio
Listen to the episode

Afternoon Review in IT Security — May 18, 2026

The threat landscape continues to evolve rapidly as malware operators capitalize on publicly disclosed source code, major infrastructure platforms report breaches, critical web server vulnerabilities face active exploitation, and security researchers demonstrate the persistent threat of zero-day flaws in mainstream software.

First Shai-Hulud Worm Clones Emerge

Threat actors have begun weaponizing the recently released Shai-Hulud malware source code in active attacks targeting NPM developers. At least one attacker has adopted the disclosed code to conduct campaigns against the open-source development community, demonstrating how quickly malicious actors can operationalize leaked malware once it becomes publicly available. The threat is particularly concerning given the widespread use of NPM packages across the software supply chain. Source: First Shai-Hulud Worm Clones Emerge

Grafana Confirms Breach After Hackers Claim They Stole Data

Grafana has confirmed that it suffered a security breach following claims by threat actors that they successfully exfiltrated company data. The Coinbase Cartel cybercrime group, which has been linked to notorious threat actors including ShinyHunters, Scattered Spider, and Lapsus$, has been identified as responsible for the intrusion. This breach highlights the continued targeting of critical infrastructure and monitoring platforms by sophisticated threat groups. Source: Grafana Confirms Breach After Hackers Claim They Stole Data

Exploitation of Critical NGINX Vulnerability Begins

Active exploitation of a critical NGINX vulnerability has commenced in the wild, with attackers leveraging the flaw to cause denial-of-service conditions on systems running default configurations. The vulnerability becomes significantly more dangerous on systems where Address Space Layout Randomization (ASLR) is disabled, enabling remote code execution capabilities. Organizations running NGINX infrastructure should prioritize patching efforts immediately. Source: Exploitation of Critical NGINX Vulnerability Begins

Hackers Earn $1,298,250 for 47 Zero-Days at Pwn2Own Berlin 2026

Security researchers concluded the Pwn2Own Berlin 2026 hacking competition by successfully exploiting 47 zero-day vulnerabilities across various platforms and applications, collectively earning $1,298,250 in bounty rewards. The contest underscores the abundance of previously unknown security flaws in mainstream software and demonstrates the value that organized security research communities place on responsible vulnerability disclosure. Source: Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026

Today's threat intelligence reveals a coordinated ecosystem of risk spanning malware reuse, high-profile infrastructure breaches, active exploitation campaigns, and the persistent discovery of critical flaws in widely deployed systems. Organizations must maintain heightened vigilance across supply chain dependencies, infrastructure platforms, and web server deployments.

Sources & IOCs

Source articles and extracted indicators (defanged where appropriate).

First Shai-Hulud Worm Clones Emerge
Malware5
  • Shai-Hulud
    Supply chain worm targeting NPM packages, steals credentials and API keys for self-propagation
  • chalk-tempalte
    Direct clone of Shai-Hulud worm deployed as malicious NPM package
  • axois-utils
    Typo-squatting malicious NPM package targeting Axios users
  • axios-util
    Typo-squatting malicious NPM package (@deadcode09284814/axios-util)
  • color-style-utils
    Malicious NPM package with DDoS botnet capabilities