Satine Sentinel: March 20, 2026

A ransomware group held a working exploit for Cisco’s firewall management software for 36 days before the vendor knew to issue a patch, long enough to own enterprise networks while defenders were still reading their morning briefings. A Russian intelligence group stole full mailbox contents, session tokens, and backup 2FA codes from a Ukrainian critical infrastructure agency without dropping a single file, sending a single suspicious link, or triggering a single endpoint alert. And a benefits administrator that most of its 2.7 million victims have never heard of spent three weeks silently draining Social Security numbers and health plan data through a vulnerable API, discovered the intrusion on January 23, and waited until March 19 to tell anyone.

The common thread is not novel tooling. It is adversaries operating inside trusted systems (a firewall management plane, a legitimate webmail session, a backend API) that defenders treat as normal infrastructure rather than attack surface.

This week: why a CVSS 10.0 Cisco zero-day sat open for a month before you could patch it, how APT28 is running entirely browser-resident espionage operations against government targets, and what “third-party benefits administrator you’ve never heard of” actually means for your employees’ most sensitive data.


Update: Stryker

Last week’s Sentinel covered the Handala wiper attack in detail. A few material developments since then:

Independent forensic estimates put the confirmed wiped device count at roughly 80,000, significant, but well short of Handala’s claimed 200,000+, consistent with the group’s documented pattern of inflating breach claims for psychological effect. Class action lawsuits have begun accumulating in federal court, with multiple firms filing on behalf of employees whose personal devices were factory-reset through Stryker’s BYOD enrollment. Handala has issued explicit warnings of follow-on attacks against other companies with business ties to Israel. If your organization has Stryker vendor relationships or supply chain dependencies, the secondary phishing risk, attackers impersonating Stryker IT teams during the device re-enrollment window, is active and credible right now.


Interlock Ransomware Held a Cisco FMC Zero-Day for 36 Days Before You Could Patch It

What happened:

Amazon Threat Intelligence disclosed this week that the Interlock ransomware group had been actively exploiting CVE-2026-20131, a CVSS 10.0 pre-authentication remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC), since January 26, 2026. That is 36 days before Cisco publicly disclosed the vulnerability and released a patch on March 4. Amazon’s researchers discovered the exploitation retroactively through MadPot, their global honeypot sensor network, after Cisco’s March advisory prompted a historical look through sensor data. They also got lucky: an Interlock infrastructure server was misconfigured, inadvertently exposing the group’s full post-exploitation toolkit for analysis. CISA added CVE-2026-20131 to its Known Exploited Vulnerabilities catalog on March 19 with a federal patch deadline of March 22. The number of organizations compromised during the 36-day zero-day window is unknown.

Technical details that matter:

Why critical institutions should care:

If you run Cisco FMC, you have two separate problems. Patch immediately, but patching alone is not enough. Interlock held this zero-day for 36 days. If your FMC management interface was accessible from the internet during that window (a configuration Cisco explicitly warns against but organizations routinely deploy), assume compromise and hunt before you patch. Amazon published a full list of indicators: IP addresses, malicious domains, and JA3 client fingerprint hashes searchable in your FMC and adjacent logs. Healthcare, manufacturing, and government are Interlock’s historically preferred sectors, and the group’s ransom notes explicitly cite HIPAA and other regulatory frameworks as pressure levers. An organization that discovers its firewall management plane was owned for a month before patching faces a fundamentally different incident response scope than a standard endpoint compromise, every firewall policy change made during that window is now potentially attacker-authored.

Key sources:


Operation GhostMail: APT28 Steals Full Mailboxes and Backup 2FA Codes Without Dropping a Single File

What happened:

Seqrite Labs published research this week on Operation GhostMail, a targeted campaign attributed with medium confidence to APT28 (Fancy Bear / Forest Blizzard) against Ukraine’s State Hydrology Agency, a critical national infrastructure body responsible for maritime and hydrographic support for shipping under Ukraine’s Ministry of Infrastructure. The attack was delivered via a single phishing email sent January 22, 2026, posing as a routine internship inquiry from a fourth-year student at the National Academy of Internal Affairs, written in Ukrainian, including an apologetic note in case it reached the wrong inbox. The student email address appears to have been a compromised account used to add legitimacy. When the recipient opened the email in Zimbra’s Classic UI, a JavaScript payload hidden in the email body executed silently in the browser. No attachments. No links. No macros. Zero detections on VirusTotal when the sample was uploaded on February 26. CISA added the underlying vulnerability, CVE-2025-66376, to its Known Exploited Vulnerabilities catalog this week with an April 1 federal patch deadline.

Technical details that matter:

Why critical institutions should care:

GhostMail is a clean demonstration of what “fileless” actually means when it reaches your email environment. Your gateway appliance that scans attachments: irrelevant. Your sandbox that detonates suspicious links: irrelevant. Your EDR watching for process execution or file writes: irrelevant. The entire attack executes inside the victim’s authenticated browser session, through the trusted Zimbra application context, with no indicator visible to any of the detection layers organizations typically rely on. The backup 2FA code theft is the piece that deserves the most operational attention: it means the attacker retains account access after a forced password reset, after MFA reconfiguration, and after the victim believes the incident is closed. Remediation requires explicit audit of app-specific passwords and IMAP access grants across affected accounts, a step most IR playbooks for credential compromise do not include. If your organization runs any Zimbra version earlier than 10.0.18 or 10.1.13 and has government contracts, defense industrial base relationships, or operations in Eastern European markets, this TTP is being aimed in your direction.

Key sources:


Navia Benefit Solutions: 2.7 Million Americans Learn They Had a Benefits Administrator

What happened:

On March 19, Navia Benefit Solutions, a Renton, Washington company that administers FSA, HSA, HRA, and COBRA benefits for over 10,000 employers across the United States, notified 2.69 million individuals that their data was stolen during a three-week window between December 22, 2025 and January 15, 2026. Navia discovered the breach on January 23. Notification letters did not go out until this week, nearly two months later. The investigation determined that an unauthorized actor exploited a vulnerability in an API used by the organization, gaining read-only access to participant records. Because the attacker did not modify systems or move funds, the intrusion was quiet enough that detection took weeks. Washington state government employees, retirees, and staff at 37 school districts are among those affected. The vast majority of the 2.7 million affected individuals have never heard of Navia, their employers contracted with them as a backend processor, invisibly, without telling anyone.

Technical details that matter:

Why critical institutions should care:

Benefits administration is a category of third-party risk that most vendor risk management programs underweight significantly. These companies aggregate enormous datasets of employee PII and health information and rarely receive the same security scrutiny as vendors with direct access to production systems. The questions to ask your HR and benefits teams immediately: who administers our FSA, HSA, and COBRA benefits? Have we reviewed their security posture? Do we have any visibility into their API access controls? The fact that Navia retained records dating back to 2018, years before some of its current employer relationships began, is also a data retention problem worth examining in your own vendor contracts. You cannot audit your way to zero risk in a third-party relationship you did not know was holding eight years of your employees’ Social Security numbers.

Key sources:


The Pattern This Week

Three incidents. Three completely different attack surfaces. The same structural problem underneath all of them.

Interlock did not compromise individual firewalls. They compromised the platform that manages the firewalls, using a zero-day that predated the patch by five weeks. APT28 did not drop malware on a Ukrainian workstation. They ran the entire operation inside the browser session already authenticated to the mail server, leaving nothing for a forensic examiner to find on the endpoint. The threat actor who hit Navia did not breach any of the 10,000 employer clients. They hit the aggregator sitting behind all of them, through an API endpoint that looked like normal traffic.

The management plane is the target. Your firewall management console, your webmail platform, your backend benefits API, your cloud identity provider. These are not background IT plumbing. They are the highest-leverage attack surfaces in your environment, the layer where a single compromised credential or a single exploited endpoint unlocks everything below it, and most of them were designed for operational convenience long before anyone modeled them as adversarial targets.

Your detection stack is built to watch endpoints. The attacks this week did not happen on endpoints.

See you next week.


The Satine Sentinel is a weekly threat intelligence roundup. Technical details are sourced from vendor analysis, incident reporting, and public disclosures. Attribution assessments reflect researcher confidence levels at time of publication.

Final CTA Section
GET STARTED

Ready to Strengthen Your Defenses?

Whether you need to test your security posture, respond to an active incident, or prepare your team for the worst: we’re ready to help.

📍 Based in Atlanta | Serving Nationwide

Discover more from Satine Technologies

Subscribe now to keep reading and get access to the full archive.

Continue reading