Sveriges mest populära poddar
Dragon Bytes

Sandboxes, Seizures, and the Industrialization of Cybercrime

27 min2 februari 2026

This week on Dragon News Bytes, Eli Woodward and Will Baxter are joined Will Thomas to break down a convergence of nation-state activity and critical infrastructure disruptions. We cover the FBI’s massive takedown of the RAMP cybercrime forum, the re-attribution of Poland’s energy sector cyberattack to Dragonfly, and a wave of critical sandbox escapes impacting developer and AI environments. Plus, we discuss how attackers are weaponizing physical snail mail for extortion and the strategic impact of Google’s latest disruption of the IPIDEA proxy infrastructure.


Topics & References:

Part 1: Major Infrastructure & Law Enforcement Actions

  • FBI Seizes RAMP Cybercrime Forum: A major blow to Russian-speaking initial access brokers (IABs). RAMP stood as a safe haven for ransomware groups like Black Cat and LockBit after other forums banned the activity.

    • Analyst Note: Expect forum migration and operational mistakes as these actors scatter to new homes.

    • Read more: https://shorturl.at/cURYo

  • Google Disrupts IPIDEA Infrastructure: A coordinated takedown of a massive residential proxy network leveraged by botnets (Kimwolf/AISURU) and fraud operations.

    • The Impact: This creates a short-term detection window for hunters as adversaries migrate to noisier fallback infrastructure.

  • Poland Energy Sector Re-attribution: CERT.PL has officially attributed the massive energy incident from late 2025 to Dragonfly (Energetic Bear) rather than Sandworm.

    • Critical Takeaway: Hitachi Energy confirmed no product flaws were used; the breach stemmed from default credentials and environmental misconfigurations.

    • Read more: 

      • https://shorturl.at/I707p

Part 2: Emerging Vulnerabilities & Malware Campaigns

  • Critical Sandbox Escapes (CVE-2026-22709): Assumptions of "safe execution" are failing in developer tooling and AI environments. We break down the Grist-Core Pyodide escape and the popular vm2 NodeJS library bypass.

  • SolarWinds Web Help Desk RCE (CVE-2025-40551): An unauthenticated remote code execution vulnerability that serves as a high-impact lateral movement enabler.

    • Key TTPs

      • Whitelist bypass using malformed URIs containing /ajax/

      • Exploitation path includes:

/helpdesk/WebObjects/Helpdesk.woa/wo/ with wopage=LoginPref

  • CVE-2026-21962: "AI Slop" or Exploit? ISC observed scanning activity targeting WebLogic with non-functional, AI-generated payloads, highlighting a new challenge in distinguish signal from noise.

  • TA584 Extortion Pivots: This initial access broker has tripled campaign volume, now using photos of physical snail mail customized with victim details to increase psychological pressure. 

  • New Report: Voices of the Cybersecury strategist - A Benchmark Report for Security Leaders. Insights from leading  CISOs, VPs, and Directors on navigating threat landscapes, allocating resources, and aligning security with business objectives.

Events & Community:

Connect with Us:

Dragon Bytes med Dragon Bytes finns tillgänglig på flera plattformar. Informationen på denna sida kommer från offentliga podd-flöden.