CISO Talk by James Azar
CyberHub Podcast
Defender 0-Days Exploited, Anthropic MCP RCE Flaw, Lazarus Drains $290M From KelpDAO
0:00
-16:31

Defender 0-Days Exploited, Anthropic MCP RCE Flaw, Lazarus Drains $290M From KelpDAO

Domain Controllers in Reboot Loops, Marimo RCE Chains into NKN Blockchain Backdoor, Shiny Hunters Lists Amman Resorts with 48-Hour Countdown, Blue Sky DDoS Outage, and 2.45 Million FTP Servers No TLS

Good Morning Security Gang,

Today’s show is one of those rare moments where multiple fault lines in cybersecurity crack at the same time. We’re not looking at isolated incidents we’re seeing systemic stress across endpoint security, AI tooling, patch management, and financial ecosystems. The common thread is clear: the controls we trust most are now being actively exploited.

Today’s episode highlights a convergence of risks across enterprise environments. Attackers are no longer focused on bypassing defenses—they are repurposing trusted systems as attack vectors. From Defender zero-days disabling detection capabilities, to AI frameworks introducing remote code execution risks by design, to crypto theft reaching industrial scale, the modern threat landscape is defined by speed, scale, and trust exploitation.

Organizations must shift from a prevention-first mindset to one centered on resilience, validation, and layered defense, particularly across identity, AI, and developer ecosystems.

Microsoft Defender Zero-Days – Security Tools as Attack Vectors

Microsoft issued emergency patches for three actively exploited zero-days in Defender for Endpoint. These vulnerabilities allowed attackers to tamper with detection mechanisms, effectively disabling security visibility.

This marks a critical shift. Endpoint Detection and Response (EDR) is no longer just a defensive layer, it has become part of the attack surface. If attackers can neutralize your detection stack, they gain time, persistence, and operational freedom.

The implication is significant: organizations relying on a single EDR solution are operating with a single point of failure.

“Attackers aren’t bypassing your defenses—they’re turning them into theirs.” James Azar and continues "That's why you need two endpoint products, not just one. It's a sad truth, but you've got to layer them. They might be able to silence Defender, but they can't silence SentinelOne or CrowdStrike. Attackers are no longer just evading endpoint security, they're actively weaponizing it."

Domain Controller Patch Failure – Operational Risk from Remediation

Simultaneously, Microsoft’s April patch cycle introduced instability in domain controllers, triggering reboot loops and widespread authentication failures.

This resulted in cascading operational disruptions, including login failures, VDI outages, and identity system degradation.

This is the paradox of modern security operations: patching is essential, but poorly validated patches can introduce systemic risk. Identity infrastructure must be treated as mission-critical systems requiring controlled deployment pipelines.

AI Supply Chain Exploitation – Marimo and Hugging Face

The Marimo RCE vulnerability, exploited within hours of disclosure, demonstrates how quickly attackers are operationalizing weaknesses in AI tooling.

Attack chains now include trusted platforms like Hugging Face, combined with decentralized command-and-control infrastructure, making mitigation more complex.

This signals a new reality: AI development environments are now enterprise attack surfaces, often deployed without the rigor applied to traditional infrastructure.

Anthropic MCP Vulnerability – Systemic AI Risk

A critical design flaw in Anthropic’s Model Context Protocol (MCP) introduces remote code execution risk across a wide ecosystem of AI development tools.

The scale of exposure millions of downloads and hundreds of thousands of instances—combined with the vendor’s stance that the behavior is “by design,” raises serious concerns about security maturity in AI frameworks.

This is not a bug. It is an architectural risk.

Lazarus Group Crypto Heist – Industrialized Financial Attacks

North Korea’s Lazarus Group executed a $290 million exploit against KelpDAO, leveraging weaknesses in cross-chain bridge architecture.

This follows a repeatable playbook: compromise infrastructure, manipulate trust assumptions, and extract value at scale.

Layer Zero is attributing the attack to North Korea’s Lazarus Group, specifically the TraderTraitor cluster.

The attack chain:

  1. Compromised the downstream RPC endpoint that DVN relied on

  2. Used DDoS to force failover to the poisoned endpoint

  3. Spoofed cross-chain messages through KelpDAO’s single verifier setup

KelpDAO is disputing the narrative, arguing the single verifier configuration was Layer Zero’s own default rather than an unusual choice.

This correlates with Bybit’s $1.5 billion heist playbook and the broader DPRK revenue engine we’ve been tracking. April 2026 is now the worst month for crypto hacks since February 2025, with over $606 million lost in 18 days.

The volume of crypto theft in April alone underscores a critical trend financial cybercrime is now operating at nation-state scale and efficiency.

Salesforce Campaign – ShinyHunters Expands Targeting

ShinyHunters continues its campaign targeting Salesforce environments, now focusing on high-value organizations like Aman Resorts.

The Aman Resorts story is short but sharp, and the clock is ticking. Ransomware.live and Hookfish report Shiny Hunters added the ultra-luxury hospitality brand Amman Resorts to its leak portal on April 19th, claiming 500,000 Salesforce records of PII with an April 21st deadline to pay or see the data posted publicly.

This listing is the latest in Shiny Hunters’ active Salesforce-centric campaign that has also touched 7-Eleven, Pitney Bowes, Canada Life Assurance Company, and Marcus & Millichap in the last two weeks.

Rather than exploiting platform vulnerabilities, attackers are abusing integrations, OAuth scopes, and API access.

This reflects a broader shift toward identity and integration layer exploitation, where traditional perimeter defenses offer little protection.

BlueSky DDoS – Availability as a Primary Target

A multi-day DDoS attack against BlueSky disrupted core platform functionality, reinforcing that availability remains a critical component of security.

As organizations adopt decentralized architectures, mitigating volumetric and application-layer attacks becomes increasingly complex.

Internet Exposure – FTP as a Persistent Weakness

Despite years of awareness, over 2.4 million internet-facing FTP servers still operate without encryption. This is not a sophisticated threat, it is a failure of basic security hygiene at global scale.

Cleartext protocols continue to provide attackers with effortless access to credentials and sensitive data.

Key Action Items

  • Deploy layered endpoint security controls to mitigate EDR tampering risks

  • Implement staged patching and validation for identity infrastructure

  • Secure AI and data science environments with enterprise-grade controls

  • Audit and restrict AI agent frameworks and MCP integrations

  • Enforce multi-verifier models in blockchain and DeFi architectures

  • Review SaaS integrations, OAuth scopes, and API access patterns

  • Strengthen DDoS response strategies with pre-defined mitigation plans

  • Eliminate cleartext protocols and enforce encryption across all services

  • Monitor for credential theft and privilege escalation indicators

  • Continuously validate trust assumptions across all systems

Leave a comment

"The pattern on today's show is brutal and consistent: your endpoint product is being weaponized against you, your patch pipeline is breaking the infrastructure it's supposed to protect, your AI tool chain from notebook servers to the MCP standard itself is a fresh RCE buffet, nation-state crews are draining DeFi bridges for a quarter billion at a time, Shiny Hunters is turning Salesforce connected apps into a breach factory, volumetric DDoS can still take major social platforms offline for days, and millions of unencrypted FTP servers still leak credentials across the public internet." James Azar

James Azar’s CISOs Take

What we’re seeing today is not a series of independent failures, it’s a systemic shift in how cyber risk manifests. Endpoint protection, AI tooling, patching processes, and financial systems are all being tested simultaneously. This isn’t coincidence. It’s the result of attackers identifying where trust has been overextended and exploiting it at scale.

The path forward requires a fundamental change in approach. Security can no longer rely on static controls or assumptions of safety. Every system must be treated as potentially compromised, every integration as a risk vector, and every layer as something that must be continuously validated. Organizations that embrace this mindset will adapt. Those that don’t will continue reacting to incidents rather than preventing impact.

Stay Cyber Safe

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

Discussion about this episode

User's avatar

Ready for more?