In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
Security WeekArchived May 09, 2026✓ Full text saved
Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Eurasian drone industry. The post In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader threat landscape.
This curated summary highlights key stories across vulnerability disclosures, emerging attack methods, policy updates, industry reports, and other noteworthy events to help readers maintain a well-rounded awareness of the evolving cybersecurity environment.
Here are this week’s highlights:
US government targets 72-hour patch cycles
US cybersecurity officials are proposing a significant reduction in federal remediation timelines, moving from a 14-day window to just three days for critical vulnerabilities, Reuters learned. This shift is driven by the rise of sophisticated AI models like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber, which allow attackers to weaponize software flaws at unprecedented speeds. It’s worth noting that CISA even now instructs federal agencies to patch some vulnerabilities within three days if the risk of exploitation is significant.
Malware leverages Windows Phone Link to steal OTPs
Cisco Talos has identified a modular malware campaign featuring the CloudZ remote access tool and a new plugin named Pheno. This threat intercepts one-time passwords and SMS messages by targeting the Microsoft Phone Link application to extract data from synchronized SQLite databases on the host PC. The infection chain utilizes a Rust-compiled loader and reflective .NET execution to bypass detection mechanisms.
Another Venezuelan ATM jackpotter to be deported
Venezuelan national David Jose Gomez Cegarra was sentenced to time served for his role in an ATM jackpotting operation that stole nearly $300,000 from several banks. The group bypassed security by physically accessing ATM hard drives to install malware, allowing them to trigger cash dispensations. Following his conviction for bank larceny, Cegarra was ordered to pay $294,000 in restitution and was transferred to ICE for deportation.
Train hacker arrested in Taiwan
A 23-year-old student has been detained in Taiwan for allegedly infiltrating the high-speed rail network and transmitting fake General Alarm signals to the control center. By cloning Tetra radio signals to trigger manual emergency braking, the suspect forced several trains to stop. Authorities seized multiple radio and electronic devices during the investigation, and the suspect now faces several charges, including interference with public transportation safety.
IBM security executive positioned as frontrunner for CISA director
Tom Parker, a security services lead at IBM, has surfaced as a primary candidate to lead the Cybersecurity and Infrastructure Security Agency (CISA) following the withdrawal of Sean Plankey. The Trump administration reportedly favors Parker’s extensive private sector background, which includes founding Hubble. If appointed, he will take over the agency currently overseen by acting director Nick Andersen.
Drone forum participants targeted in Eurasian spy operation
Researchers have identified a targeted spy operation called Operation Silent Rotor aimed at the Eurasian drone industry. Attackers used spear-phishing emails disguised as orders from the Russian Aeronautical Information Center to trick victims into running malware that steals data. The campaign was specifically timed to hit attendees of the Unmanned Aviation 2026 forum in Moscow, allowing the hackers to compromise high-value targets in the sector.
More US residents imprisoned for operating North Korean laptop farms
Matthew Isaac Knoot and Erick Ntekereze Prince were each sentenced to 18 months in prison for enabling North Korean IT workers to infiltrate nearly 70 US companies and generate $1.2 million for the sanctioned regime. The defendants hosted corporate laptops at their homes and installed unauthorized remote access software to create the illusion that the overseas workers were operating from within the United States.
Gaming platform exploited in North Korean spy campaign
The North Korea-linked threat actor ScarCruft conducted targeted surveillance against users in the Yanbian region of China by compromising a video game platform used by ethnic Koreans living there. By trojanizing Windows update files and Android game packages, the group deployed the BirdCall backdoor to exfiltrate personal documents and record audio from victim devices.
New Linux backdoor PamDOORa
A threat actor known as ‘darkworm’ is marketing the source code for PamDOORa, a sophisticated post-exploitation tool designed to compromise the Linux Pluggable Authentication Module (PAM) stack. This backdoor enables persistent SSH access while simultaneously harvesting plaintext credentials from legitimate users, potentially even from incident responders. The malware is currently being offered on a Russian cybercrime forum for $900.
Hard power cycles required to eradicate Firestarter implant from Cisco firewalls
The ArcaneDoor cyber espionage group is using a persistent Linux-based malware called Firestarter to compromise Cisco firewalls. According to Eclypsium, this implant hooks the core LINA process to evade detection and remains active even after firmware patches by re-installing its persistence mechanism during the system’s reboot sequence. Performing a hard power cycle by physically disconnecting the hardware from all power sources for at least one minute is needed to fully purge the infection.
Related: In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Related: In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
WRITTEN BY
SecurityWeek News
More from SecurityWeek News
Webinar Today: Securing Identity Across Humans, Machines and AI
Autonomous Offensive Security Firm XBOW Raises $35 Million
In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Webinar Today: A Step-by-Step Approach to AI Governance
In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
Copperhelm Raises $7 Million for Agentic Cloud Security Platform
In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested
In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack
Latest News
Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
AI Firm Braintrust Prompts API Key Rotation After Data Breach
Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom
‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
Ransomware Group Takes Credit for Trellix Hack
Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover
Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders
Trending
Webinar: ROSI For CPS Security Programs
May 13, 2026
In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Malwarebytes has named Chung Ip as Chief Financial Officer.
Semperis has appointed John Podboy as Chief Information Security Officer.
Randy Menon has become Chief Product and Marketing Officer at One Identity.
More People On The Move
Expert Insights
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
Flipboard
Reddit
Whatsapp
Email