Trojanized updates, silent exploits, and how attackers abuse trusted tools ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­    ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­  
ThreatLocker: Zero Trust Weekly

This week in Zero Trust

Here are your weekly tips to stay ahead of cyber threats.

Estimated reading time:  5-6 minutes

 

In this issue:

  • Notepad++ compromise: Technical analysis and mitigations
  • WinRAR CVE-2025-8088: Directory traversal vulnerability
  • Airports under watch: 600% year-over-year increase in ransomware attacks
  • From click to containment: Stopping a BEC in minutes
  • Threats you need to know: DKnife AitM and TeamPCP worm
View in browser

Manage preferences

From the CEO

Make it harder for hackers

 

"One goal of cybersecurity is to slow hackers down enough that it becomes too costly and time-consuming to breach your systems." - Danny Jenkins

From the ThreatLocker blog

Abused trust in action: Updates, archives, and inboxes 

 

Breaking down the Notepad++ supply chain compromise

Trusted updates turned into attack paths

  • What happened: Notepad++ disclosed a supply chain compromise that affected its update infrastructure. Attackers breached the update delivery mechanism and used it to distribute trojanized installers to targeted users. Multiple independent researchers believe a Chinese state-sponsored group was behind the campaign, which was active from roughly June through December 2025. 
  • Why it matters: Software supply chains, especially update distribution mechanisms, are high-value targets for cybercriminals. Assumed trust in widely used tools can be exploited if it isn't backed by strong validation and architectural controls. 
  • Key takeaways: Trojanized updates were identified in versions 8.8.2 through 8.8.9. Users should update to 8.9.1 or later using official sources. To prevent a similar style attack, organizations should enforce strict execution controls regarding what software is allowed to run and monitor for unusual update behavior. 

Directory traversal vulnerability enables arbitrary file writes

Why WinRAR became a silent delivery mechanism

  • What happened: A critical WinRAR vulnerability, CVE-2025-8088, was disclosed and patched after being actively exploited as a zero-day. The flaw affects WinRAR 7.12 and earlier on Windows and allows specially crafted RAR archives to perform directory traversal, enabling attackers to write files to arbitrary locations on a victim system. By abusing alternate data streams (ADS), malicious payloads can be silently dropped into sensitive paths leading to persistence or code execution. The vulnerability has been exploited in the wild since mid-July 2025 by both cybercriminal and state-sponsored threat actors.
  • Why it matters: Many systems still run vulnerable versions of WinRAR, and exploitation can occur silently with no user warning. This makes routine patching and controls that limit where software can write and execute critical defenses.
  • Key takeaways: Update to WinRAR 7.13 or later. Avoid extracting archives from untrusted sources, monitor sensitive directories for unexpected file writes, and enforce strong application control policies to prevent unauthorized tools or payloads from executing. 

Why aviation is a prime cyber target

Tackling operational technology vulnerabilities 

  • What's happening: From 2000 to early 2024, nearly two-thirds of documented cyberattacks in the aviation sector targeted airports directly. Furthermore, aviation saw a 600% year-over-year increase in cyberattacks in 2024 driven by ransomware, supply-chain compromise, and politically motivated disruption. Airports also depend on aging operational technology often running legacy software that's difficult to patch and poorly monitored. 
  • Why it matters: Modern airports rely on a sprawling digital ecosystem including customer-facing apps, baggage handling systems, biometrics, IoT devices, and third-party vendors. This expanding attack surface creates blind spots that attackers increasingly exploit. Successful attacks can disrupt baggage handling, ground flights, compromise passenger data, and erode public trust.
  • Key takeaways: A Zero Trust approach is critical for infrastructure as complex and essential as airports. Following the Zero Trust journey of Heathrow Airport shows how strict access controls and execution policies can help reduce risk while maintaining operational resilience.

Neutralizing a threat in minutes using Zero Trust

A real-world BEC containment incident

  • What you need to know: Law firm RumbergerKirk experienced a business email compromise when a user clicked a malicious link that led to credential theft. The malicious link was emailed to numerous employees, so the security team had a narrow window to act. The team used ThreatLocker Unified Audit to gain instant visibility into who had followed the link and used Network Control to immediately block the bad domain.
  • Why it matters: BEC attacks don't rely on malware; they rely on legitimate access. Once credentials are compromised, attackers blend into normal workflows. With AI enhancing the realism of phishing and social engineering attempts, employee education is not enough to prevent credential theft. 
  • Key takeaways: Speed matters, and prevention is worth more than response. Having instant visibility gave RumbergerKirk the ability to contain the attack, limit the impact, and avoid a full-scale incident. 

Threats you need to know

Edge, cloud, and identity abuse

 

China-linked DKnife AitM framework hijacks network traffic

  • What you need to know: Researchers have uncovered a sophisticated adversary-in-the-middle framework dubbed DKnife operated by China-linked threat actors since at least 2019. It targets Linux-based routers and edge devices, allowing attackers to intercept and manipulate in-transit network traffic. It consists of seven modular implants designed for deep packet inspection, credential harvesting, and malware delivery. 

  • Why it matters: Because DKnife operates at the network edge, it can compromise all devices behind the infected gateway without needing direct access to them. This makes it a stealthy espionage platform that can persist undetected for years and deliver secondary malware through trusted update paths.
  • Key takeaways: Assume traffic can be intercepted even when it looks legitimate. Limit what can execute even after a compromise. Monitor for behavior, not just known indicators. 

TeamPCP worm exploits cloud misconfigurations

  • What you need to know: Researchers have identified a new self-propagating worm dubbed TeamPCP. It targets cloud environments by exploiting exposed services and misconfigurations rather than traditional software vulnerabilities. Once it gains access to a cloud workload, TeamPCP attempts to spread laterally by abusing insecure credentials, overly permissive configurations, and publicly exposed management interfaces. 

  • Why it matters: TeamPCP highlights how cloud environments can be compromised without malware exploits or zero-days. Misconfigured services, weak identity controls, and excessive permissions allow attackers to automate discovery, persistence, and expansion across cloud assets. Because activity often uses legitimate tooling and APIs, it blends into normal operations and evades detection.
  • Key takeaways: Reduce exposure by limiting public-facing services and enforcing least-privilege access. Treat cloud credentials as high-risk assets and monitor for abnormal use of cloud APIs and management interfaces. Assume misconfigurations will occur and design controls that prevent abuse when it does.
Zero Trust World 2026, Orlando, FL, March 4-6

What you'll love about ZTW26:

  • Industry-leading speakers—Adam Savage, Linus Sebastian, Jason Silva, Jakoby, David Spark + ThreatLocker leadership
  • In-person Cyber Hero Help Desk—real-time triage with our engineers

  • Professional headshot booth
  • Cyber Hero Exam—pass onsite & get your registration refunded
  • New ThreatLocker solutions

Earn up to 35 CPE credits during the three-day event.

Secure your spot today

Use code ZTWWEEKLY26 to save $200 on your registration.

Cyber Hero Frontline, a magazine by ThreatLocker

Cyber Hero Frontline Issue 3 will be here before you know it. Subscribe to get the print copy sent right to your door and be notified of the digital release. 

Get Cyber Hero Frontline
ThreatLocker: Zero Trust Platform | Zero Trust Weekly

ThreatLocker, 1950 Summit Park Dr, Floor 4, Orlando, Florida 32810, United States

Manage preferences

Connect with us

                             

©2026 ThreatLocker Inc., All Rights Reserved