
🎯Basically, hackers stole $290 million using old tricks and new tech.
What Happened
In the latest ThreatsDay Bulletin, a staggering $290 million was stolen from the decentralized finance (DeFi) project KelpDAO, allegedly orchestrated by North Korean threat actors known as TraderTraitor. This incident underscores persistent vulnerabilities in the crypto space, exacerbated by a messy supply chain and outdated security practices.
Major Exploits
In addition to the DeFi hack, MajorDoMo, a smart home automation platform, is facing exploitation of critical vulnerabilities. CVE-2026-27175 allows attackers to execute commands remotely, while CVE-2026-27174 enables unauthenticated remote code execution. These flaws have already been exploited to install persistent backdoors on affected systems.
Supply Chain Malware Surge
The bulletin also reveals a surge in malicious packages within the npm registry. Multiple packages were found to steal sensitive data and implant backdoors. Notably, some packages can self-propagate, spreading malware across ecosystems, including PyPI.
AI Threats
Moreover, Forcepoint has identified 10 new indirect prompt injection payloads targeting AI systems. These payloads are designed to manipulate AI agents into executing harmful actions, such as financial fraud and data theft.
Covert Browser Access
The Claude desktop app has been flagged for granting itself unauthorized access to web browser data. This raises significant privacy concerns, particularly in the context of EU regulations.
Hardware Vulnerabilities
In a related development, reports from Iran allege that U.S.-made networking equipment may have been sabotaged with hidden backdoors, leading to disruptions during critical moments. This points to potential supply chain vulnerabilities that could have far-reaching implications.
Ransomware Rivalry
The bulletin also covers the escalating conflict between ransomware groups, where Krybit retaliated against rival 0APT after a data leak. This infighting highlights the chaotic and competitive nature of the ransomware landscape.
Conclusion
The ThreatsDay Bulletin serves as a stark reminder of the evolving threat landscape. From high-profile hacks to ongoing exploitation of vulnerabilities, organizations must remain vigilant and proactive in their cybersecurity efforts.
🔒 Pro insight: The KelpDAO hack exemplifies how supply chain vulnerabilities can be exploited in decentralized finance environments.




