CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 09, 2026

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

Security Week Archived May 09, 2026 ✓ Full text saved

Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Eurasian drone industry. The post In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader threat landscape. This curated summary highlights key stories across vulnerability disclosures, emerging attack methods, policy updates, industry reports, and other noteworthy events to help readers maintain a well-rounded awareness of the evolving cybersecurity environment. Here are this week’s highlights: US government targets 72-hour patch cycles US cybersecurity officials are proposing a significant reduction in federal remediation timelines, moving from a 14-day window to just three days for critical vulnerabilities, Reuters learned. This shift is driven by the rise of sophisticated AI models like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber, which allow attackers to weaponize software flaws at unprecedented speeds. It’s worth noting that CISA even now instructs federal agencies to patch some vulnerabilities within three days if the risk of exploitation is significant.  Malware leverages Windows Phone Link to steal OTPs Cisco Talos has identified a modular malware campaign featuring the CloudZ remote access tool and a new plugin named Pheno. This threat intercepts one-time passwords and SMS messages by targeting the Microsoft Phone Link application to extract data from synchronized SQLite databases on the host PC. The infection chain utilizes a Rust-compiled loader and reflective .NET execution to bypass detection mechanisms. Another Venezuelan ATM jackpotter to be deported Venezuelan national David Jose Gomez Cegarra was sentenced to time served for his role in an ATM jackpotting operation that stole nearly $300,000 from several banks. The group bypassed security by physically accessing ATM hard drives to install malware, allowing them to trigger cash dispensations. Following his conviction for bank larceny, Cegarra was ordered to pay $294,000 in restitution and was transferred to ICE for deportation. Train hacker arrested in Taiwan A 23-year-old student has been detained in Taiwan for allegedly infiltrating the high-speed rail network and transmitting fake General Alarm signals to the control center. By cloning Tetra radio signals to trigger manual emergency braking, the suspect forced several trains to stop. Authorities seized multiple radio and electronic devices during the investigation, and the suspect now faces several charges, including interference with public transportation safety. IBM security executive positioned as frontrunner for CISA director Tom Parker, a security services lead at IBM, has surfaced as a primary candidate to lead the Cybersecurity and Infrastructure Security Agency (CISA) following the withdrawal of Sean Plankey. The Trump administration reportedly favors Parker’s extensive private sector background, which includes founding Hubble. If appointed, he will take over the agency currently overseen by acting director Nick Andersen. Drone forum participants targeted in Eurasian spy operation   Researchers have identified a targeted spy operation called Operation Silent Rotor aimed at the Eurasian drone industry. Attackers used spear-phishing emails disguised as orders from the Russian Aeronautical Information Center to trick victims into running malware that steals data. The campaign was specifically timed to hit attendees of the Unmanned Aviation 2026 forum in Moscow, allowing the hackers to compromise high-value targets in the sector. More US residents imprisoned for operating North Korean laptop farms Matthew Isaac Knoot and Erick Ntekereze Prince were each sentenced to 18 months in prison for enabling North Korean IT workers to infiltrate nearly 70 US companies and generate $1.2 million for the sanctioned regime. The defendants hosted corporate laptops at their homes and installed unauthorized remote access software to create the illusion that the overseas workers were operating from within the United States.  Gaming platform exploited in North Korean spy campaign The North Korea-linked threat actor ScarCruft conducted targeted surveillance against users in the Yanbian region of China by compromising a video game platform used by ethnic Koreans living there. By trojanizing Windows update files and Android game packages, the group deployed the BirdCall backdoor to exfiltrate personal documents and record audio from victim devices.  New Linux backdoor PamDOORa  A threat actor known as ‘darkworm’ is marketing the source code for PamDOORa, a sophisticated post-exploitation tool designed to compromise the Linux Pluggable Authentication Module (PAM) stack. This backdoor enables persistent SSH access while simultaneously harvesting plaintext credentials from legitimate users, potentially even from incident responders. The malware is currently being offered on a Russian cybercrime forum for $900. Hard power cycles required to eradicate Firestarter implant from Cisco firewalls   The ArcaneDoor cyber espionage group is using a persistent Linux-based malware called Firestarter to compromise Cisco firewalls. According to Eclypsium, this implant hooks the core LINA process to evade detection and remains active even after firmware patches by re-installing its persistence mechanism during the system’s reboot sequence. Performing a hard power cycle by physically disconnecting the hardware from all power sources for at least one minute is needed to fully purge the infection. Related: In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability Related: In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device WRITTEN BY SecurityWeek News More from SecurityWeek News Webinar Today: Securing Identity Across Humans, Machines and AI Autonomous Offensive Security Firm XBOW Raises $35 Million In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability  Webinar Today: A Step-by-Step Approach to AI Governance In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device Copperhelm Raises $7 Million for Agentic Cloud Security Platform In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack Latest News Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants AI Firm Braintrust Prompts API Key Rotation After Data Breach Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials Ransomware Group Takes Credit for Trellix Hack Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders Trending Webinar: ROSI For CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Malwarebytes has named Chung Ip as Chief Financial Officer. Semperis has appointed John Podboy as Chief Information Security Officer. Randy Menon has become Chief Product and Marketing Officer at One Identity. More People On The Move Expert Insights The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 09, 2026
    Archived
    May 09, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗