CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR May 11, 2026

InfoSec News Nuggets 05/11/2026

AboutDFIR Archived May 11, 2026 ✓ Full text saved

Over 500 Organizations Hit in Years-Long Phishing Campaign SOCRadar reported that Operation HookedWing has stolen more than 2,000 credentials from more than 500 organizations across aviation, critical infrastructure, energy, logistics, government, financial services, and technology. The campaign has used GitHub domains, compromised servers, Microsoft and Outlook-themed lures, and personalized landing pages to make credential theft […] The post InfoSec News Nuggets 05/11/2026 appeared first on Ab

Full text archived locally
✦ AI Summary · Claude Sonnet


    By MaryOn May 11, 2026 Over 500 Organizations Hit in Years-Long Phishing Campaign SOCRadar reported that Operation HookedWing has stolen more than 2,000 credentials from more than 500 organizations across aviation, critical infrastructure, energy, logistics, government, financial services, and technology. The campaign has used GitHub domains, compromised servers, Microsoft and Outlook-themed lures, and personalized landing pages to make credential theft pages look more legitimate. This matters because the targeting isn’t random. The campaign appears focused on organizations with sensitive operations or high-value credentials that can be reused, sold, or passed to other threat actors.   Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak Researchers disclosed CVE-2026-7482, a critical Ollama vulnerability that could let a remote unauthenticated attacker leak process memory from affected servers. The flaw impacts Ollama deployments that allow attacker-supplied GGUF model files through the API, and researchers estimate more than 300,000 servers may be exposed globally. This is useful for security teams because local AI infrastructure is becoming part of the enterprise attack surface, and exposed model-serving systems may hold prompts, credentials, tokens, or other sensitive runtime data.   JDownloader site hacked to replace installers with Python RAT malware The official JDownloader website was compromised between May 6 and May 7 to redirect some Windows and Linux downloads to malicious installers. The Windows payload reportedly deployed a Python-based remote access trojan, turning a trusted software download path into an initial access mechanism. The practical takeaway is that defenders shouldn’t assume official download sites are safe by default. Teams should validate installer hashes where possible, monitor for unexpected RAT behavior after software installation, and review downloads made during the affected window.   Polish intelligence warns hackers attacked water treatment control systems Poland’s domestic intelligence service said attackers breached water treatment facilities in five towns in 2025, and in some cases accessed industrial control systems that could have affected water supply operations. The agency didn’t attribute the incidents publicly, but it warned that hostile cyber activity against Poland has intensified, with a focus on Russian services and activity that could support sabotage. This matters for critical infrastructure teams because it shows continued interest in moving from espionage and disruption messaging toward access that could affect physical operations.   CISA urges critical infrastructure firms to ‘fortify’ before it’s too late CISA released CI Fortify guidance to help critical infrastructure operators plan for isolation and recovery during a major cyberattack or serious disruption. The guidance focuses on keeping vital services running in a degraded state, identifying key dependencies, documenting manual recovery options, and practicing restoration if systems are compromised. This is practical for energy, water, transportation, and other infrastructure operators because it shifts planning from prevention alone to operating through compromise. CATEGORIESInfoSec News Nuggets TAGSAboutDFIRcisaJDownloadernews nuggets SHARE FACEBOOK TWITTER LINKEDIN PINTEREST STUMBLEUPON EMAIL
    💬 Team Notes
    Article Info
    Source
    AboutDFIR
    Category
    ◍ Incident Response & DFIR
    Published
    May 11, 2026
    Archived
    May 11, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗