TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Weekly Threat Bulletin – April 15th, 2026

2026-04-15 · Read original ↗

ATT&CK techniques detected

13 predictions
T1566.002Spearphishing Link
96%
"< # # > [. ] com `. unc6783 employs a phishing kit to bypass multi - factor authentication by stealing clipboard contents and enrolling their own devices for persistent access, and they distribute remote access malware via fake security software updates. following data exfiltrati…"
T1204.002Malicious File
94%
"weekly threat bulletin – april 15th, 2026 acrobat reader zero - day exploited in the wild for many months a zero - day vulnerability in adobe acrobat reader has been actively exploited since november 2025, and potentially earlier, as discovered by security researcher haifei li th…"
T1556.006Multi-Factor Authentication
87%
"enforce principles of least privilege for their accounts, and include security requirements in all contracts. - deploy an application whitelisting or application control solution on endpoints to restrict software execution to only approved applications, preventing the launch of u…"
T1204.002Malicious File
86%
"##e ' initiates an outbound network connection. - configure endpoint security tools or automated malware analysis sandboxes to detect and alert on pdf files that execute javascript containing the ' rss. addfeed ( ) ' or ' util. readfileintostream ( ) ' api calls. - monitor adobe …"
T1204.004Malicious Copy and Paste
85%
"thecyberexpress. com / unc6783 - bpo - providers - as - cyberattack - gateways / https : / / www. hendryadrian. com / google - new - unc6783 - hackers - steal - corporate - zendesk - support - tickets / https : / / www. infosecurity - magazine. com / news / google - warns - group…"
T1068Exploitation for Privilege Escalation
80%
"email attachments and web downloads to analyze suspicious files, such as pdfs, in an isolated environment to detect and block malicious behavior before it reaches an endpoint. - enhance endpoint detection and response ( edr ) policies to detect and alert on anomalous behavior fro…"
T1204.002Malicious File
76%
"thecyberexpress. com / unc6783 - bpo - providers - as - cyberattack - gateways / https : / / www. hendryadrian. com / google - new - unc6783 - hackers - steal - corporate - zendesk - support - tickets / https : / / www. infosecurity - magazine. com / news / google - warns - group…"
T1556.006Multi-Factor Authentication
61%
"query identity provider ( e. g., okta ) and siem logs for instances of a user account successfully authenticating from a new or anomalous location, immediately followed by the enrollment of a new multi - factor authentication ( mfa ) device. - add the ip addresses 169. 40. 2. 68 …"
T1204.002Malicious File
60%
"automatically launch script editor with pre - filled, obfuscated code. this code executes a ` curl | zsh ` command, which downloads and runs a script directly in system memory. the script then decodes a base64 + gzip payload, downloads a mach - o binary to ` / tmp / helper `, rem…"
T1059.002AppleScript
57%
"- configure your endpoint detection and response ( edr ) tool to generate a high - severity alert for any process execution of ` script editor ` that spawns a shell process ( like ` zsh ` or ` bash ` ) which then initiates a network connection using ` curl ` or ` wget `. - create…"
T1204.002Malicious File
50%
"##points to prevent the execution of unauthorized applications and scripts, particularly from temporary or user - writable directories like ` / tmp `. - update the security awareness training program to include specific modules on social engineering attacks targeting macos, demon…"
T1566.002Spearphishing Link
49%
"##hackers. com / windows - defender - 0 - day - published - online / https : / / securityonline. info / bluehammer - windows - defender - 0 - day - lpe - exploit / https : / / www. helpnetsecurity. com / 2026 / 04 / 08 / bluehammer - windows - zero - day - exploit - leaked / ' se…"
T1543.003Windows Service
35%
"integrity, and creates a malicious temporary windows service, ultimately restoring the original password hash. while microsoft ' s current defender signature for the exploit is easily bypassed, organizations should implement behavioral detection by monitoring for volume shadow co…"

Summary

These are the top threats you should know about this week.