← Back to Briefings
DAILY BRIEFING · MAY 20, 2026 · #063

Microsoft, Drupal, Linux critical patches; OAuth phishing bypasses MFA on 340+ orgs

📅 May 20, 2026🤖 AI-Generated Analysis5 min read
How to read this briefing
Verified facts — NVD & CISA KEV Partially verified — awaiting NVD enrichment AI analysis — synthesis, verify before acting [1]Inline citations — click any [N] to view the source
Actionable · Verified facts
NVD-published · CISA KEV cross-checked
CVECVSSVendor · ProductExploitationRefs
🛡️CVE-2026-316357.5 NVD 3.1Linux Linux Kernelno reports[1] [2]
Contextual · AI analysis Synthesized from 10 feeds · verify before acting

TL;DR

Microsoft disrupted a malware-signing service enabling ransomware distribution; Drupal releases critical patches May 20; OAuth phishing bypasses MFA on 340+ Microsoft 365 organizations. Patch immediately and enable additional authentication factors.

THREAT LEVEL: HIGH – Multiple critical vulnerabilities and active phishing campaigns targeting enterprise authentication require immediate patching and credential review.

Executive Summary

Top Threats Today

1. Fox Tempest Malware-Signing Service Disrupted

Severity: HIGH   Affected: technology

Microsoft has unsealed a legal case in U.S. District Court detailing the disruption of Fox Tempest, a malware-signing-as-a-service platform that has provided cybercriminals with code-signing tools [1][2]. The service has been operating since May 2025 and was used to distribute ransomware and other malware disguised as legitimate software [2][3]. This disruption removes a critical infrastructure tool relied upon by multiple ransomware gangs and cybercriminal groups.
Sources:[1] BleepingComputer[2] The Record[3] SecurityWeek

Recommended Action

  • Review logs for any suspicious code-signing certificates issued within your environment over the past year.
  • Implement application whitelisting and code-signing verification policies.
  • Monitor for malware samples signed with certificates issued between May 2025 and the disruption date.

2. EvilTokens OAuth Phishing Bypasses MFA on 340+ Organizations

Severity: HIGH   Affected: technology

A phishing-as-a-service platform called EvilTokens went live in February 2026 and has compromised more than 340 Microsoft 365 organizations across five countries within five weeks [1]. The platform uses OAuth consent prompts directing users to enter short codes at microsoft.com/devi[cetype] to steal authentication tokens, bypassing traditional multi-factor authentication by obtaining legitimate OAuth consent [1]. This attack vector represents a significant evolution in credential theft methodology that standard MFA configurations may not prevent.
Sources:[1] The Hacker News

Recommended Action

  • Review Microsoft 365 audit logs for unusual OAuth consent grants, particularly those granting mail or calendar permissions.
  • Implement conditional access policies to restrict OAuth application consent from unfamiliar locations.
  • Deploy additional authentication context requirements (e.g., passwordless sign-in or hardware security keys) for sensitive operations.
  • Educate users on OAuth consent prompt verification and warn against entering codes on non-Microsoft domains.

3. Drupal Urgent Core Security Release May 20

Severity: HIGH   Affected: technology

Drupal has announced a “core security release” for all supported branches scheduled for May 20, 2026, from 5–9 p.m. UTC [1]. The Drupal Security Team has stated that exploits might be developed within hours or days of the patch release [1][2]. Details of the vulnerability have not been disclosed in advance, but the urgency and scope indicate a highly critical flaw affecting all supported Drupal versions.
Sources:[1] The Hacker News[2] SecurityWeek

Recommended Action

  • Reserve maintenance windows immediately following the May 20 patch release window.
  • Test patches in a staging environment before deploying to production.
  • Apply updates to all supported Drupal installations within 24 hours of patch availability.
  • Monitor security advisories and public exploit repositories for any disclosed details between now and patch release.

4. CVE-2026-31635 Linux Kernel LPE PoC Released

Severity: HIGH   Affected: technology

Proof-of-concept exploit code dubbed DirtyDecrypt (also known as DirtyCBC) has been released for CVE-2026-31635, a recently patched local privilege escalation vulnerability in the Linux kernel [1]. The flaw was discovered and reported by the Zellic and V12 security teams on May 9, 2026 [1]. Public availability of working exploit code significantly elevates risk for unpatched systems.
Sources:[1] The Hacker News

Recommended Action

  • Prioritize kernel updates on all Linux systems, especially those with local user access.
  • Review and restrict local shell access to trusted users only.
  • Monitor systems for signs of privilege escalation attempts.
  • Enable kernel security modules (AppArmor, SELinux) to restrict exploitation vectors.

5. Trapdoor Android Ad Fraud Campaign Targets 659M Daily Bid Requests

Severity: MEDIUM   Affected: technology

Cybersecurity researchers from HUMAN's Satori Threat Intelligence and Research Team have disclosed details of Trapdoor, an ad fraud and malvertising operation targeting Android users [1]. The campaign encompassed 455 malicious Android apps and 183 threat actor-owned command-and-control infrastructure, generating 659 million daily bid requests [1]. This represents a significant ad fraud operation, though impact is primarily limited to compromised device owners and advertiser fraud losses.
Sources:[1] The Hacker News

Recommended Action

  • Review Android device security: disable installation from unknown sources and enable Play Protect.
  • Audit installed applications for any from the list of 455 identified malicious apps.
  • Monitor for unusual data consumption or device slowdowns indicative of background ad fraud activity.
  • Keep Android OS and all applications up to date with latest security patches.

Today’s Action Checklist

🤖 This briefing was compiled by defend.network using AI-powered analysis of multiple cybersecurity sources including CISA advisories, vendor security bulletins, and threat intelligence feeds. Always verify critical intelligence through official vendor channels before taking action.

Get Tomorrow’s Briefing in Your Inbox

Subscribe free and never miss a daily threat briefing.