Cybersec Sentinel

Cybersec Sentinel

Cybersec Sentinel: 30+ years of IT expertise, delivering clear, actionable cyber security insights.
VodkaStealer Malware Harvests Browser Credentials and Session Token
Malware

VodkaStealer Malware Harvests Browser Credentials and Session Token

Threat Group – Unidentified financially motivated threat actor associated with the ClickFix WordPress compromise campaign Threat Type – Information Stealer Exploited Vulnerabilities – ClickFix social engineering using compromised WordPress sites and fake Cloudflare verification prompts Malware Used – VodkaStealer, DoubleDonut loader, ChromElevator Threat Score – 🔴 7.6 High – Advanced credential harvesting malware delivered through large
5 min read
Microsoft Excel Vulnerability CVE-2026-26144 May Allow Data Exposure Through Copilot
Vulnerabilities

Microsoft Excel Vulnerability CVE-2026-26144 May Allow Data Exposure Through Copilot

Threat Group – Unknown / Opportunistic Threat Actors Threat Type – Information Disclosure Vulnerability Exploited Vulnerabilities – CVE-2026-26144 Malware Used – None required (AI-assisted data exfiltration via Copilot Agent) Threat Score – 7.2 🔴 High – The vulnerability enables zero interaction data leakage through an automated AI agent integrated into Microsoft Office. The flaw can be triggered
6 min read
UnsolicitedBooker Deploys MarsSnake Against Telecom Providers
Malware

UnsolicitedBooker Deploys MarsSnake Against Telecom Providers

Threat Group – UnsolicitedBooker Threat Type – Backdoor / Advanced Persistent Threat Exploited Vulnerabilities – CVE-2018-0802 Malware Used – MarsSnake, MarsSnakeLoader, LuciDoor, LuciLoad Threat Score – 8.7 🔥 Critical – State aligned espionage platform with wormable capability, decentralised IPFS command fallback, telecommunications targeting, long term persistence and advanced evasion techniques Last Threat Observation – 24 February 2026 Overview
5 min read
Evelyn Stealer and the rising risk of developer tool supply chain attacks
Malware

Evelyn Stealer and the rising risk of developer tool supply chain attacks

Threat Group: Unknown cybercriminal operators leveraging developer tooling supply chains Threat Type: Information stealer malware delivered via malicious development extensions Exploited Vulnerabilities: Abuse of the Visual Studio Code extension trust model, DLL side loading, PowerShell execution policy misuse, Windows process hollowing Malware Used: Evelyn Stealer, Lightshot.dll downloader, iknowyou.model
6 min read