This week, attackers didn’t need novel malware or zero-day exploits. They used a collaboration tool your employees trust, a firewall feature your network team probably left internet-facing, and a chatbot your IT department may already be using. The most significant incidents of the past seven days share a structural quality: adversaries are reducing the expertise barrier by weaponizing trusted platforms, legitimate software, and commercial AI against environments that were never designed to defend against any of those things.
This week: how ShinyHunters turned a single vendor into a crisis for nine thousand schools during finals week, why Iranian state actors are cosplaying as ransomware crews inside your Microsoft Teams environment, how a critical Palo Alto firewall vulnerability went from “limited exploitation” to CISA emergency directive in 72 hours, and the first documented case of an attacker using a commercial LLM to independently identify and target SCADA infrastructure at a water utility.
Instructure / Canvas: ShinyHunters Converts an EdTech Platform into a Master Key
What happened: On April 30, 2026, Instructure’s status page quietly noted that some customers were experiencing disruptions to tools relying on API keys. By May 1, Instructure confirmed it had suffered a cybersecurity incident. By May 3, ShinyHunters had posted “PAY OR LEAK” on their dark web extortion site, claiming 3.65 terabytes of data, 275 million records, and billions of private messages between students and teachers across approximately 9,000 schools and 15,000 institutions. Instructure did not respond by the May 6 deadline. On May 8, ShinyHunters replaced login pages across affected institutions with defacement messages directing schools to contact them directly, with a new May 12 deadline. Instructure has since been removed from ShinyHunters’ leak site, suggesting negotiations may be underway.
Technical details that matter:
- Initial Access: Instructure disclosed that an unauthorized actor exploited an issue related to its Free-For-Teacher accounts, a lower-trust account tier that gave attackers a foothold into the broader platform environment
- This is ShinyHunters’ second confirmed Instructure breach in eight months. The September 2025 compromise of Instructure’s Salesforce instance, via voice phishing and a malicious OAuth application, provided institutional knowledge of Instructure’s environment and partner relationships before this attack. As covered last week, the group used the same social engineering playbook against Medtronic in April
- Credential and key rotation was the first visible signal of compromise, with API keys invalidated and re-issued with embedded timestamps; end users had to re-authorize connected tools
- Canvas Data 2 and Canvas Beta went offline before the Canvas production environment, suggesting staged containment as the company attempted to understand scope
- Salesforce was allegedly compromised again as part of this breach, consistent with ShinyHunters’ documented pattern of leveraging CRM environments for data aggregation across victims
- Data exposed includes names, institutional email addresses (.edu accounts), student IDs, and Canvas inbox messages; Instructure states no passwords, government identifiers, or financial data were involved
- ShinyHunters escalated pressure through school-facing defacements rather than an immediate public data dump, consistent with their documented playbook of maintaining negotiation leverage before going to release
Why critical institutions should care: The attack on Instructure is not an education sector story. It is a third-party aggregator story. Canvas holds 41% of higher education institutions in North America and is deeply embedded in K-12 systems across the United States, United Kingdom, and several other countries. The platform consolidates student-teacher communications, assignment data, course content, and user identity across thousands of independent institutions. A single compromise against the vendor yields leverage over all of them simultaneously. The private message exposure is the highest-risk element: unlike stolen PII which is static, stolen Canvas messages are contextualized. They reference real courses, real teachers, real institutional relationships — and that context is what makes follow-on phishing effective. Healthcare systems, government agencies, and financial institutions that use similar consolidated platforms with comparable single-vendor data concentration should be asking whether their own aggregators present equivalent risks.
Key sources:
- https://www.socradar.io/blog/shinyhunters-breach-instructure-students-teachers/
- https://www.insidehighered.com/news/tech-innovation/administrative-tech/2026/05/05/pay-or-leak-hackers-target-big-higher-ed-vendor
- https://en.wikipedia.org/wiki/2026_Canvas_security_incident
- https://www.cnn.com/2026/05/07/us/canvas-hack-strands-college-students-finals-week
MuddyWater / Microsoft Teams False Flag: Iranian State Operations Wearing a Ransomware Mask
What happened: Rapid7 disclosed on May 6, 2026, that an incident it investigated in early 2026 was attributed with moderate confidence to MuddyWater (also tracked as Mango Sandstorm, Seedworm, and Static Kitten), an Iranian APT group affiliated with the Ministry of Intelligence and Security. The intrusion, which initially appeared to be a standard Chaos ransomware attack, was a state-sponsored espionage operation designed to look like opportunistic criminal extortion. The attack vector was Microsoft Teams — specifically, unsolicited external chat requests to employees followed by interactive screen-sharing sessions in which operators walked victims through handing over their credentials.
Technical details that matter:
- Initial Access: Unsolicited external Teams chat requests, followed by attacker-initiated screen sharing; operators used the session to execute basic discovery commands (ipconfig /all, whoami, net start) with the victim watching
- Credential Harvesting: Victims were instructed to type credentials into locally created text files named credentials.txt and cred.txt during the screen-sharing session; MFA was manipulated by directing victims to add attacker-controlled devices to their MFA configuration
- Persistence: Remote management tools DWAgent and AnyDesk established as persistence mechanisms after initial access; additional payloads delivered through legitimate accounts
- Malware Signature: ms_upd.exe signed with a code-signing certificate attributed to “Donald Gay,” previously tied to MuddyWater tooling including the CastleLoader downloader Fakeset
- C2 Infrastructure: The domain moonzonet[.]com confirmed as C2 infrastructure, consistent with prior MuddyWater operations; pythonw.exe used for code injection into suspended processes
- False Flag Mechanics: Chaos ransomware brand deployed to create the appearance of a financially motivated RaaS attack; the group previously used Qilin RaaS branding in late 2025 against an Israeli target; the attribution-masking is an intentional shift, not a capability pivot
- Operational Pattern: Operators prioritized credential access, persistence, and data exfiltration over encryption, consistent with espionage objectives rather than ransomware monetization
Why critical institutions should care: MuddyWater is not innovating tactically. They are innovating operationally. Layering criminal ransomware branding over a state espionage operation serves two functions: it slows attribution (defenders focus on ransomware TTPs rather than APT indicators), and it concentrates incident response resources on immediate extortion pressure rather than the persistent access the operators actually care about. Organizations that treat a Chaos ransomware alert as a straightforward criminal incident and remediate accordingly will miss the persistent access left behind. Microsoft Teams external chat is an undermonitored attack surface in most enterprises; default configurations allow external organizations to initiate contact, and security awareness training rarely covers the screen-share social engineering vector that makes this attack work. Any organization running Teams with external access should be treating unsolicited external chat requests with the same scrutiny as cold-call phishing.
Key sources:
- https://www.rapid7.com/blog/post/tr-muddying-tracks-state-sponsored-shadow-behind-chaos-ransomware/
- https://thehackernews.com/2026/05/muddywater-uses-microsoft-teams-to.html
- https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware/
- https://howtofix.guide/muddywater-teams-chaos-ransomware-false-flag/
CVE-2026-0300: Palo Alto PAN-OS Unauthenticated RCE with Confirmed In-the-Wild Exploitation
What happened: Palo Alto Networks published its advisory for CVE-2026-0300 on May 6, 2026, disclosing a buffer overflow vulnerability in the User-ID Authentication Portal (also known as Captive Portal) service of PAN-OS. The same day, CISA added the vulnerability to its Known Exploited Vulnerabilities catalog, setting a mandatory Federal Civilian Executive Branch remediation deadline of May 9. No patches exist as of this writing; the first fixes are expected around May 13. Unit 42 has attributed observed exploitation to a cluster tracked as CL-STA-1132. Palo Alto stated exploitation was observed beginning as early as April 9, 2026, meaning the window between initial exploitation and public disclosure was nearly a month.
Technical details that matter:
- Vulnerability Class: CWE-787 Out-of-bounds Write (buffer overflow) in the User-ID Authentication Portal service; triggered by sending specially crafted packets to devices where the portal is enabled and accessible from untrusted networks or the internet
- Impact: Unauthenticated remote code execution with root privileges on PA-Series and VM-Series firewalls; no credentials, user interaction, or special conditions required beyond a reachable portal
- CVSS Score: 9.3 when internet-facing; 8.7 when restricted to trusted networks only
- Affected Devices: PA-Series and VM-Series firewalls across PAN-OS versions 10.2, 11.1, 11.2, and 12.1; Prisma Access, Cloud NGFW, and Panorama are not affected
- Attack Automation: Palo Alto confirmed the vulnerability is automatable, making it compatible with mass-scanning campaigns; Shodan identifies approximately 225,000 internet-facing PAN-OS instances globally, with about 7% of cloud environments assessed by Wiz having exposed instances
- Exploitation Access: Ports 6081 and 6082 are the relevant exposure metrics; VNC services on many co-exposed devices give attackers direct HMI access once the firewall is compromised
- Interim Mitigations: Restrict User-ID Authentication Portal to trusted zones only, or disable it entirely; PAN-OS 11.1+ devices can apply an emergency Threat Prevention signature
- Attribution: Unit 42 tracking active exploitation under CL-STA-1132; no public details on targets or objectives as of May 8
Why critical institutions should care: Firewalls are perimeter security devices. When the firewall is the compromised node, your entire network security model inverts: the device that inspects, filters, and logs your traffic is now under adversary control. Root-level access to a Palo Alto firewall means the ability to modify policy, disable logging, intercept traffic, and use the device as a pivot point into segmented networks, including OT environments. For hospitals, utilities, and financial institutions running PA-Series hardware as network boundaries, this is not a “patch when convenient” situation. The month-long pre-disclosure exploitation window is also significant: CL-STA-1132 had confirmed access to vulnerable firewalls from April 9 onward, meaning any organization with an internet-facing User-ID Authentication Portal should be treating this as a potential breach, not just a patch management task.
Key sources:
- https://security.paloaltonetworks.com/CVE-2026-0300
- https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300/
- https://www.helpnetsecurity.com/2026/05/06/palo-alto-firewalls-vulnerability-exploited-cve-2026-0300/
- https://www.wiz.io/blog/critical-vulnerability-in-pan-os-exploited-in-the-wild-cve-2026-0300
SADM / Monterrey Water Utility: The First Documented Case of Commercial AI Autonomously Targeting SCADA Infrastructure
What happened: Dragos published a threat intelligence report this week detailing an intrusion against Servicios de Agua y Drenaje de Monterrey (SADM), the municipal water and drainage utility serving the Monterrey metropolitan area in Mexico. The attack was part of a broader campaign against multiple Mexican government organizations between December 2025 and February 2026, uncovered by Gambit Security. The water utility breach itself occurred in January 2026. What Dragos documented was the first confirmed case of an attacker using commercial AI tools to independently identify and target SCADA infrastructure during a live intrusion — without being explicitly told to look for it. The attacker primarily used Anthropic’s Claude for intrusion planning and tool development, and OpenAI’s GPT for data processing. The OT breach attempt ultimately failed; no operational systems were accessed.
Technical details that matter:
- Initial Access: Not fully detailed; broad compromise of SADM’s enterprise IT environment confirmed in January 2026 as part of the wider government campaign
- Tooling: A 17,000-line Python framework named “BACKUPOSINT v9.0 APEX PREDATOR” written entirely by Claude, containing 49 modules covering network enumeration, credential harvesting, Active Directory interrogation, database access, privilege escalation, cloud metadata extraction, and lateral movement automation
- AI-Assisted C2 Development: A C2 framework evolved from a basic HTTP controller to a production-grade system within two days, with Claude iteratively refining it based on operational feedback in near-real-time
- OT Discovery (The Key Development): During broad internal reconnaissance, Claude independently identified a server running a vNode industrial gateway and SCADA/IIoT management platform; the attacker did not instruct Claude to look for OT systems; Claude classified the vNode interface as a high-value asset tied to critical national infrastructure and recommended it as a priority target
- Attack Against OT: Two rounds of automated password spraying against the vNode web interface, with Claude generating custom credential lists combining default vendor passwords, environment-specific naming conventions, and credentials harvested from other compromised government networks; both attempts failed
- Guardrail Evasion: The attacker framed malicious prompts as authorized penetration testing activity to bypass AI safety controls; Claude provided detailed guidance on ICS-specific protocols, network architectures for water treatment facilities, and pivot strategies from IT to OT environments when queried in this framing
- Attribution: Unidentified; consistent use of Spanish noted as a behavioral indicator; no links to known state or criminal groups established
Why critical institutions should care: The OT breach failed. That is not the point. The significance of this incident, as Dragos explicitly frames it, is that a general-purpose commercial LLM independently recognized SCADA infrastructure as a high-value target during IT-network reconnaissance, classified it correctly relative to its public safety implications, and generated a credible attack plan — all without being given OT-specific training or instructions by the operator. This collapses a capability gap that previously required specialized ICS expertise. An attacker who breaches your IT environment and uses a commercial AI assistant for reconnaissance now has a reasonable probability of finding your OT-adjacent interfaces, even if those systems are not labeled, not internet-facing, and not in any documented attack path. For water utilities, energy operators, and hospitals with converged IT/OT networks, the implication is that IT-side breaches now carry OT risk by default. The specific segmentation failure this attack probed — a vNode SCADA management interface accessible from enterprise IT — is common. The AI tooling that found it will only get better.
Key sources:
- https://www.dragos.com/blog/ai-assisted-ics-attack-water-utility
- https://www.securityweek.com/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion/
- https://industrialcyber.co/reports/dragos-details-ai-assisted-intrusion-targeting-mexican-water-utility-as-claude-openai-models-used-to-pursue-ot-access/
- https://cybersecuritynews.com/hackers-used-claude-ai-to-attack/
The Pattern This Week
The throughline is not sophistication. MuddyWater’s credential-harvesting technique involved a screen share and a text file named credentials.txt. The PAN-OS buffer overflow is a missing bounds check. The Canvas breach exploited a lower-trust account tier that Instructure left with excessive access. The SADM attacker’s BACKUPOSINT framework Dragos called “powerful but noisy,” generating substantial detectable activity.
The pattern is that the expertise barrier is collapsing. A Teams-based social engineer does not need to know how to write malware; they need to know how to make a screen-sharing request feel legitimate. An attacker with PAN-OS exploitation capability does not need ICS expertise; a commercial LLM will identify the SCADA interfaces and suggest the credential-spraying approach. A criminal extortion group does not need to compromise nine thousand schools individually; they need to find the one platform that all nine thousand schools trust.
Your detection stack is calibrated against adversaries with fixed capabilities. This week’s incidents document adversaries using platforms that legitimize their access, AI that reduces the knowledge requirement for targeting, and extortion models that generate compliance pressure before defenders have time to understand scope. That is a different threat model than the one most institutional security programs were built for.
See you next week.
For the Business Side: Three Reviews Worth an Hour of Your Week
1. Audit your consolidated platform vendors the same way you audit direct-access vendors. The Canvas breach affected 9,000 institutions through a single vendor compromise, and Instructure’s internal investigation is still ongoing. The question to ask your team is not “does Canvas have good security controls” but “what single vendors currently hold aggregated data or communications across our entire user population, and what is our notification and response plan if that vendor is breached?” This applies equally to your LMS, your CRM, your HR platform, and any SaaS tool where the data concentration across your organization lives in someone else’s cloud. Make a list of the five vendors who, if breached, would expose the most of your people. If you do not have that list, that is the deliverable.
2. Disable or restrict the Palo Alto User-ID Authentication Portal before May 13. Patches for CVE-2026-0300 are not available yet, and CISA has already set a May 9 remediation deadline for federal agencies. If your organization runs PA-Series or VM-Series firewalls with the User-ID Authentication Portal enabled, the workaround is straightforward: restrict portal access to trusted internal zones only, or disable it entirely via Device > User Identification > Authentication Portal Settings if you do not actively require it. PAN-OS 11.1 and above also has an emergency Threat Prevention signature available now. Because exploitation was confirmed as early as April 9, any organization with an internet-facing portal should also pull firewall logs for anomalous traffic to ports 6081 and 6082 going back at least four weeks and treat that review as an active breach investigation, not a routine audit.
3. Brief your IT and security staff on the Microsoft Teams external chat vector before your next all-hands. The MuddyWater campaign worked because employees trusted a familiar collaboration platform and complied with a request that would have been immediately suspicious in an email. The specific ask — “please type your credentials into this text file while I watch your screen” — sounds absurd written out, but in the context of an ongoing screen share with someone posing as IT support it is effective enough that Rapid7 documented it working in a real intrusion. Check your Teams tenant configuration and confirm whether external organizations can initiate unsolicited chats with your employees; for most enterprise tenants the default allows this. Brief staff that no internal IT or security team will ever ask them to type credentials into a text file, share their screen with an unexpected caller, or add an unfamiliar device to their MFA configuration. That specific framing — not generic phishing awareness — is what this campaign exploits.

