Cybersecurity threat map visualization showing nation-state actor activity from Russia, China, Iran, and North Korea targeting global business infrastructure — PSY Logistics Technology Partners Monday Threat Intelligence Report, March 2026

Monday Threat Intelligence Report: Nation-State Cyber Threats Targeting Businesses — March 23, 2026

March 23, 20269 min read

⚠DIB FOCUS: Items marked 🎯 have direct relevance to Defense Industrial Base contractors and CMMC/NIST 800-171 compliance obligations.

🔴SECTION 1 — EMERGING THREATS

🎯 PRIORITY ALERT: Dark Storm Team Signals Imminent Large-Scale Infrastructure Operations — #OpAsia & #OpEurope [CRITICAL]T1190 | T1498 | T1499 | T1592

Dark Storm Team (also tracked as DarkStorm, TeamDarkStorm, and MRHELL112) has posted active signaling on its Telegram channels announcing expanded offensive operations under the hashtags #OpAsia and #OpEurope, indicating imminent large-scale distributed denial-of-service and ransomware campaigns targeting critical infrastructure across both regions. The group — which successfully disrupted X/Twitter (March 10, 2025), BreachForums, Finland's Central Bank, Hungary's Ministry of Defense, LAX, JFK, Charles de Gaulle Airport, and Haifa Port — has demonstrated both the intent and proven capability to take down high-value public-sector and transportation targets. Palo Alto Networks Unit 42 confirmed in March 2026 that Dark Storm Team is operating as part of the broader pro-Iranian and pro-Palestinian hacktivist umbrella, actively coordinating with other threat actors including groups under the Electronic Operations Room established February 28, 2026 following Operation Epic Fury. Cyble threat intelligence notes the group's formal partnership with the pro-Russian Matryoshka 424 coalition, amplifying its operational reach and tooling access. Dark Storm now markets DDoS-as-a-Service (DaaS) capabilities to affiliate actors, meaning #OpAsia and #OpEurope operations are likely to involve coordinated volunteer-driven botnets alongside hired capacity. Known TTPs include exploitation of public-facing applications (T1190), Network Denial-of-Service (T1498), Endpoint Denial-of-Service (T1499), and reconnaissance via metadata harvesting (T1592). For DIB contractors, maritime operators, and transportation-adjacent organizations with any European or Asia-Pacific supply chain exposure — this is an active, elevated threat requiring immediate defensive posture review.

Source: Unit 42 / Palo Alto Networks (March 2026); Cyble Threat Actor Profile; Check Point Research; Orange Cyberdefense CIB

🎯 Iran-Nexus Hacktivist Surge: Electronic Operations Room Coordinates Multi-Vector Campaigns Against Western DIB [CRITICAL]T1498 | T1485 | T1491

Following Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel) on February 28, 2026, Unit 42 has documented a significant surge in Iran-aligned hacktivist activity with approximately 60 individual threat groups now active. The newly established Electronic Operations Room is coordinating synchronized DDoS attacks, data-wiping operations, and website defacements against Israeli and Western critical infrastructure. Key actors include Handala Hack (linked to Iran's MOIS), the Cyber Islamic Resistance umbrella (coordinating RipperSec and Cyb3rDrag0nzz), and Dark Storm Team. Claimed operations include compromise of an Israeli energy exploration company, Jordanian fuel systems, Israeli payment infrastructure, and Israeli civilian healthcare. DIB contractors with any operations, partners, or supply chain exposure in the Middle East, Europe, or Asia must treat this as an elevated, active threat environment requiring enhanced monitoring and incident response readiness.

Source: Palo Alto Networks Unit 42, Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

DarkSword iOS/macOS Multi-Stage Exploit Chain Under Active Exploitation [CRITICAL]T1190 | T1068CVE-2025-31277 | CVE-2025-43510 | CVE-2025-43520

Security researchers have identified an active multi-stage attack chain dubbed 'DarkSword' targeting Apple's full ecosystem — iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The chain requires zero app installation and minimal user interaction: a victim visits a malicious website through Safari or an in-app browser, triggering CVE-2025-31277 (memory corruption, CWE-119) for initial code execution, followed by further privilege escalation to kernel-level access via CVE-2025-43510 and CVE-2025-43520. The kernel-level access makes this chain particularly attractive to APT groups for long-term surveillance, data exfiltration, and targeted espionage. CISA added all four DarkSword CVEs to its KEV catalog on March 20, 2026, with federal agency patch deadline of April 3, 2026. All organizations — including DIB contractors with mobile device fleets — should treat this as immediate priority.

Source: CISA KEV (March 20, 2026); CyberPress; Apple Security Updates

SECTION 2 — EXPLOITS IN THE WILD

CISA KEV Update: Five New Vulnerabilities Added — March 20, 2026 [HIGH]CVE-2025-31277 | CVE-2025-32432 | CVE-2025-43510 | CVE-2025-43520 | CVE-2025-54068 | CVE-2026-20131 | CVE-2026-20963

CISA added five vulnerabilities to its Known Exploited Vulnerabilities catalog on March 20, 2026, all subject to BOD 22-01 remediation requirements for Federal Civilian Executive Branch agencies. The additions include the DarkSword Apple chain (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520), a Craft CMS code injection vulnerability (CVE-2025-32432), and a Laravel Livewire code injection flaw (CVE-2025-54068). The Cisco Secure Firewall Management Center (FMC) remote code execution vulnerability CVE-2026-20131 (also added March 20) allows an unauthenticated remote attacker to execute arbitrary Java code as root — a critical risk for any organization using Cisco FMC in their SOC or network security architecture. Microsoft SharePoint deserialization vulnerability CVE-2026-20963 enables unauthorized code execution over a network.

Source: CISA (cisa.gov, March 20, 2026)

🎯 Broadcom VMware Aria Operations Command Injection — CVE-2026-22719 (CVSS 8.1) Actively Exploited [HIGH]T1190CVE-2026-22719 | CVSS 8.1

CISA added CVE-2026-22719 to the KEV catalog on March 3, 2026, citing active exploitation in the wild. The vulnerability allows an unauthenticated attacker to execute arbitrary commands, leading to remote code execution in VMware Aria Operations during support-assisted product migration. Federal agencies had a remediation deadline of March 24, 2026. Broadcom has released patches alongside fixes for CVE-2026-22720 (stored XSS) and CVE-2026-22721 (privilege escalation to administrative access). Any DIB organization using VMware Aria for infrastructure management must treat this as immediate priority given confirmed active exploitation.

Source: The Hacker News; CISA KEV; Broadcom Security Advisory

🎯 Ivanti EPM Authentication Bypass + SolarWinds Web Help Desk Deserialization — Both in Active Exploitation [HIGH]T1190 | T1078CVE-2026-1603 | CVE-2025-26399 | CVE-2026-21902 | CVE-2026-20127

CISA added CVE-2026-1603 (Ivanti Endpoint Manager authentication bypass) and CVE-2025-26399 (SolarWinds Web Help Desk deserialization of untrusted data) to the KEV catalog on March 9, 2026. Both products are widely deployed across DIB contractor environments and managed service providers. The Ivanti EPM authentication bypass is particularly concerning given Ivanti's history as a high-value target for nation-state actors. Cyble CRIL tracked 1,641 new vulnerabilities in the week of March 4-10, 2026 alone, with 200 rated Critical under CVSS v3.1 and 175 with public proof-of-concept exploits available. Energy and Transportation sectors were disproportionately impacted, with Juniper Junos RCE (CVE-2026-21902) and Cisco SD-WAN authentication bypass (CVE-2026-20127) among the most critical for infrastructure operators.

Source: CISA KEV (March 9, 2026); Cyble CRIL Weekly Vulnerability Tracker

🛡️SECTION 3 — MITIGATION GUIDANCE

ACTION: Elevate DDoS defenses immediately. Review upstream bandwidth protection and CDN/WAF configurations (Cloudflare, Akamai, AWS Shield) ahead of anticipated Dark Storm #OpAsia and #OpEurope campaigns. Validate DDoS runbooks and ensure escalation paths are current.

Priority: IMMEDIATE

Applies to: All internet-facing infrastructure; critical infrastructure operators; maritime/port facilities; transportation-sector organizations

ACTION: Patch ALL Apple devices to current software versions immediately. CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520 form the DarkSword chain enabling kernel-level device compromise with zero user interaction. Federal deadline: April 3, 2026. DIB contractors should treat equivalently.

Priority: IMMEDIATE

Applies to: All Apple iOS/iPadOS/macOS/watchOS/tvOS/visionOS devices across the enterprise and mobile fleets

ACTION: Patch Cisco FMC (CVE-2026-20131) and VMware Aria Operations (CVE-2026-22719) on an emergency basis. Unauthenticated RCE as root on security management infrastructure represents existential risk to organizational security posture. Validate patch installation and verify no indicators of prior compromise.

Priority: IMMEDIATE

Applies to: Cisco Secure Firewall Management Center; Cisco Security Cloud Control; VMware Aria Operations

ACTION: Patch Ivanti EPM (CVE-2026-1603) and SolarWinds Web Help Desk (CVE-2025-26399). If patching cannot be completed within 24-48 hours, evaluate whether affected systems can be temporarily taken offline or isolated from external network access. Both are confirmed exploited in the wild.

Priority: IMMEDIATE

Applies to: Ivanti Endpoint Manager; SolarWinds Web Help Desk; IT management infrastructure

ACTION: 🎯 DIB SPECIFIC: Monitor the DoD/DC3 DIB Cybersecurity Program channels for Dark Storm / hacktivist threat intelligence. If not enrolled in the DIB-VDP or DIB CS Program bilateral sharing arrangement, initiate enrollment now. Dark Storm has demonstrated willingness and capability to target defense-adjacent logistics, transportation, and port infrastructure.

Priority: HIGH

Applies to: DIB contractors; maritime/MTSA-regulated facilities; logistics and transportation operators supporting defense supply chains

ACTION: Review and test incident response runbooks for DDoS scenarios. Confirm availability of DDoS mitigation provider contact information, escalation procedures, and communication trees. Validate that critical services have documented failover procedures and business continuity plans are current.

Priority: HIGH

Applies to: All organizations; priority for transportation, port/maritime, financial, government-adjacent sectors

📋SECTION 4 — BREACH DISCLOSURES & RECENT INCIDENTS

🎯 Interlock Ransomware Targets AMTEC (Defense Ammunition Contractor) — DIB Supply Chain Exposure [HIGH]T1486 | T1537

Interlock ransomware group compromised AMTEC, a manufacturer of lethal and non-lethal ammunition, explosives, and cartridges for U.S. military and law enforcement. Parent company National Presto Industries filed an SEC 8-K on March 6 disclosing 'a system outage caused by a cybersecurity incident.' Leaked data reportedly includes documents referencing contracts with the U.S. Department of Defense, transportation codes, destinations, personnel involved in logistics, and intermediary contractors. Multiple top global defense corporations are identified in the leaked dataset. Resecurity analysis indicates this incident exposes classified-adjacent supply chain data of significant value to foreign intelligence and nation-state actors. DIB organizations should assess third-party exposure through ammunition and ordnance supply chain relationships.

Source: Resecurity; National Presto Industries SEC Form 8-K (March 6, 2026); DataBreaches.net

Dark Storm Conducts DDoS Against Finland Central Bank and Hungary Ministry of Defense [HIGH]T1498

Following the X/Twitter DDoS operation in March 2025, Dark Storm Team's subsequent campaign targeted Finland's Central Bank and Hungary's Ministry of Defense with sustained DDoS attacks, demonstrating the group's willingness to directly engage NATO member financial and defense infrastructure. These operations preceded the current #OpAsia and #OpEurope signaling and should be treated as proof of operational capability rather than isolated incidents. The group's transition toward DDoS-as-a-Service (DaaS) and its alignment with pro-Russian hacktivist coalitions signals an increasingly professionalizing threat actor with sustained financial motivation alongside political ideology.

Source: Cybernews; SecurityScorecard; Check Point Research

BridgePay Ransomware Attack Disrupts City Government Payments Infrastructure [MEDIUM]T1486

BridgePay, a payments platform with significant city government customer concentration, confirmed a ransomware attack causing system disruption. Multiple municipal governments reported service outages. As of February 28, 2026, BridgePay had restored all infrastructure. The incident highlights continued ransomware targeting of payment and municipal infrastructure providers — a category of growing interest to hacktivist groups seeking maximum public impact. DragonForce ransomware group simultaneously listed German insurer HanseMerkur on its dark web leak site, claiming exfiltration of approximately 97GB including financial documents, tax records, and possible data linked to Emirates Insurance.

Source: PKWARE 2026 Data Breaches Tracker; BlackFog State of Ransomware 2026

ABOUT PSY LOGISTICS TECHNOLOGY PARTNERS

CMMC Compliance|Maritime Cybersecurity|vCISO Services|ISO 27001 Advisory

Craig Wood, CISM | CCA Lead Assessor | ISO 27001 Lead Auditor

[email protected]|psylogistics.com|Houston, TX & Littleton, CO

Back to Blog