Cyber Threat Brief — April 13 2026
1. Adobe Acrobat/Reader Prototype Pollution RCE — CVE-2026-34621
TL;DR: Adobe issued an emergency out-of-band patch (APSB26-43, April 11) for a prototype pollution flaw in the Acrobat JavaScript engine exploited in the wild since at least December 2025 via Russian-language oil/gas lure PDFs. CVSS 8.6, Priority 1.
What’s New:
- CVE-2026-34621 now assigned to the previously unpatched zero-day tracked by EXPMON/Haifei Li (disclosed April 9); advisory CVSS revised from AV:N to AV:L on April 12
- Exploit chain: malicious PDF → embedded JS (>10 KB) → prototype pollution →
util.readFileIntoStream()local file read →RSS.addFeed()exfil to C2, receives second-stage JS for RCE - Known lure:
Invoice540.pdf(SHA-25654077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377f), C2169.40.2.68:45191, UA stringAdobe Synchronizer - Affected: Acrobat Reader DC ≤ 26.001.21367 (fix: 26.001.21411), Acrobat 2024 ≤ 24.001.30356 (fix: 24.001.30362 Win / 24.001.30360 macOS)
- Indicators in malicious PDFs: JS blobs >10 KB, multiple stream objects with identical checksums, executable content embedded in stream objects
Actionable Intel
| Artifact | Type | ATT&CK | Log Source | Action |
|---|---|---|---|---|
SHA-256 54077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377f | Hash (lure PDF) | T1204.002 | EDR, email gateway, AV | Block |
169.40.2.68:45191 | IP:Port (C2) | T1071.001 | Firewall, proxy, Zeek conn.log | Block |
UA string Adobe Synchronizer in non-Adobe network traffic | Network | T1071.001 | Proxy logs | Hunt — not a legitimate Adobe UA |
AcroRd32.exe / Acrobat.exe making outbound connections to non-Adobe IPs | Process-Network | T1204.002 | EDR, Sysmon EID 3 | Alert |
PDF files with embedded JS >10 KB and util.readFileIntoStream calls | File content | T1059.007 | Email gateway, sandbox | Block/quarantine |
RSS.addFeed() calls in PDF JavaScript | File content | T1041 | Sandbox detonation logs | Alert — rarely used legitimately |
Detection
| Source | Rule | Gap |
|---|---|---|
| Splunk ESCU | None specific to CVE-2026-34621 | Need: AcroRd32.exe spawning network connections to non-Adobe IPs; PDF email attachment with JS >10 KB |
| Elastic | Suspicious PDF Reader Child Process (partial) | Gap: no coverage for util.readFileIntoStream abuse or RSS.addFeed exfil |
| Sigma | None specific | Need: proc_creation_win_acrobat_reader_suspicious_network.yml for Reader outbound to non-Adobe destinations |
Sources: Adobe APSB26-43 · The Hacker News · Help Net Security · SecurityWeek
2. APT28 FrostArmada — SOHO Router DNS Hijacking at Scale
TL;DR: Microsoft, NCSC-UK, and Lumen disclosed APT28/Forest Blizzard hijacking DNS on 5,000+ SOHO routers (MikroTik, TP-Link) to intercept M365 authentication tokens via AitM since August 2025. DOJ disrupted the US portion (Operation Masquerade) on April 7; Black Lotus Labs published IOCs.
What’s New:
- Campaign codename FrostArmada (Lumen Black Lotus Labs); sub-group Storm-2754 handles router exploitation
- Technique: exploit known vulns (e.g., CVE-2023-50224 on TP-Link WR841N) → modify DHCP/DNS settings to actor-controlled resolvers → downstream devices inherit poisoned DNS → targeted domain lookups (M365 login, email) redirected to AitM infrastructure → credential/token harvest
- Tool: legitimate
dnsmasqutility on actor VPS for DNS forwarding with selective poisoning on port 53 - Scale: 200+ organizations, 5,000+ consumer devices, 18,000+ unique IPs at peak (Dec 2025), 120+ countries; primarily government, defense, law enforcement
- DOJ Operation Masquerade: FBI sent commands to compromised US routers to reset DNS settings and block re-access, spanning 23+ US states
- NCSC-UK advisory (April 7) includes VPS banner patterns, router models, domains, IPs, and MITRE ATT&CK mapping
- IOCs continuously updated: Black Lotus Labs GitHub
Actionable Intel
| Artifact | Type | ATT&CK | Log Source | Action |
|---|---|---|---|---|
| FrostArmada IOC IP list (Black Lotus Labs GitHub) | IP addresses (malicious DNS resolvers) | T1584.001 | Firewall, DNS logs, router configs | Block — check all SOHO router DNS settings against this list |
| DNS queries to non-ISP/non-corporate resolvers from SOHO segments | Network | T1557.002 | DNS logs, NetFlow, Zeek dns.log | Hunt — SOHO devices should use corporate or known-good resolvers |
dnsmasq banner on port 53 from unexpected IPs | Network | T1583.003 | Network scanning, Shodan/Censys | Hunt — actor VPS infrastructure fingerprint |
| DHCP-assigned DNS servers not matching corporate policy | Configuration | T1557.002 | DHCP logs, endpoint DNS config audit | Alert — primary detection for downstream compromise |
| Invalid/mismatched TLS certificates on M365 or email login pages | Network | T1557.002 | Proxy TLS inspection, browser cert logs | Alert — AitM indicator |
| CVE-2023-50224 exploitation attempts on TP-Link WR841N | Network | T1190 | IDS/IPS, router logs | Block |
Detection
| Source | Rule | Gap |
|---|---|---|
| Splunk ESCU | None specific to FrostArmada | Need: DNS resolver configuration drift detection on endpoints; DHCP DNS mismatch alerting |
| Elastic | None specific | Gap: no SOHO DNS hijack detection; need DNS resolver validation rule |
| Sigma | None specific | Need: net_dns_config_change_suspicious_resolver.yml for non-corporate DNS resolver assignment |
Sources: Microsoft Security Blog · NCSC-UK Advisory · Lumen FrostArmada · DOJ Press Release · FBI IC3 PSA · Black Lotus Labs IOCs · Krebs on Security
Status Updates
- CVE-2026-35616 (FortiClient EMS): Federal KEV deadline passed April 9; exploitation ongoing since March 31; only hotfix available — full fix 7.4.7 still pending. Original brief.
- CVE-2026-1340 / CVE-2026-1281 (Ivanti EPMM): Federal KEV deadline passed April 11; mass exploitation continues; Ivanti RPM detection tool available for IOC scanning. Original brief.
- CVE-2026-4681 (PTC Windchill): Still no patch; German police physically notifying affected orgs; CISA ICS advisory ICSA-26-085-03 active. Original brief.
- CVE-2025-53521 (F5 BIG-IP APM / BRICKSTORM): UNC5221 exploitation ongoing; federal deadline passed March 30. Original brief.
- CVE-2026-3055 (Citrix NetScaler): Active exploitation via SAMLRequest and /wsfed/passive paths; Metasploit module available; federal deadline passed April 2. Original brief.