← Back to Briefings

Daily Threat Briefing – March 25, 2026

📅 March 25, 2026🤖 AI-Generated Analysis5 min read
THREAT LEVEL: CRITICAL – Supply chain attacks and wiper malware targeting critical infrastructure require immediate response and patching across all software dependencies.

Executive Summary

Top Threats Today

1. TeamPCP Supply Chain Attack on LiteLLM Package

Severity: CRITICAL   Affected: Technology

TeamPCP has compromised LiteLLM versions 1.82.7–1.82.8 on PyPI, injecting malicious code that harvests credentials, includes Kubernetes lateral movement toolkits, and establishes persistent backdoors. This attack follows TeamPCP's earlier compromises of Trivy and KICS security tools, indicating a coordinated campaign against critical development infrastructure. Hundreds of thousands of devices are estimated to be affected by credential theft from this supply chain breach.

Recommended Action

  • Immediately audit all LiteLLM installations and upgrade to patched versions beyond 1.82.8
  • Scan systems for indicators of compromise including credential harvesting and Kubernetes access patterns
  • Review all authentication tokens and credentials for accounts that may have interacted with compromised versions
  • Implement strict dependency scanning and verification across all CI/CD pipelines

2. Iran-Backed Wiper Attack on Stryker Medical Devices

Severity: CRITICAL   Affected: Healthcare

Iranian hacktivist groups claimed responsibility for a destructive cyberattack against Stryker Corporation, wiping data from over 200,000 company devices and forcing the shutdown of production lines for approximately two weeks. This represents a significant disruption to medical device manufacturing and supply chains, with potential patient safety implications.

Recommended Action

  • Ensure critical medical device systems have isolated, offline backup copies with secure restoration procedures
  • Implement network segmentation between operational technology and corporate IT systems
  • Review incident response plans for wiper malware including communication protocols and recovery prioritization
  • Coordinate with healthcare sector ISACs for threat intelligence on Iranian attack patterns

3. PTC Windchill and FlexPLM Critical RCE Vulnerability

Severity: CRITICAL   Affected: Manufacturing

PTC Inc. has warned of a critical remote code execution vulnerability in Windchill and FlexPLM product lifecycle management solutions widely used in manufacturing and engineering sectors. The threat is considered imminent with active exploitation anticipated, requiring urgent patching before adversaries can gain control of engineering data and production systems.

Recommended Action

  • Obtain and deploy PTC security patches immediately across all Windchill and FlexPLM installations
  • Isolate affected systems on separate network segments pending patch deployment if immediate updates are not possible
  • Monitor system logs for exploitation attempts including unusual API calls and data access patterns
  • Engage with PTC support to obtain detailed vulnerability information and ensure complete remediation

4. ScreenConnect Malware Delivered via Malvertising Tax Campaign

Severity: HIGH   Affected: Finance

A large-scale malvertising campaign active since January 2026 targets U.S. individuals searching for tax documents with rogue ScreenConnect installers. The campaign deploys HwAudKiller tool that disables endpoint detection and response systems using Huawei driver vulnerabilities, enabling attackers to evade security controls and establish persistent access on compromised systems.

Recommended Action

  • Educate end users to verify legitimacy of tax software through official IRS and vendor websites only
  • Deploy EDR tools that monitor for HwAudKiller and driver-based security evasion techniques
  • Block malicious ad networks and tax-related domains identified in threat intelligence feeds
  • Conduct forensic analysis on any systems running unexpected ScreenConnect installations

5. Poisoned GitHub Repositories and OpenClaw Trojan Campaign

Severity: HIGH   Affected: Technology

AI-assisted campaigns are distributing over 300 poisoned packages across GitHub and package repositories disguised as legitimate developer tools and game cheats. The OpenClaw Deployer trojan spreads through these repositories, targeting developers and introducing malware into development pipelines and software supply chains.

Recommended Action

  • Implement mandatory code review and dependency verification processes for all third-party packages
  • Use software composition analysis tools to identify malicious or suspicious packages in development environments
  • Audit GitHub actions and CI/CD workflows for unauthorized package installations or unusual dependencies
  • Maintain allowlists of approved package sources and repositories in build systems

Today’s Action Checklist

🤖 This briefing was compiled by defend.network using AI-powered analysis of multiple cybersecurity sources including CISA advisories, vendor security bulletins, and threat intelligence feeds. Always verify critical intelligence through official vendor channels before taking action.

Get Tomorrow’s Briefing in Your Inbox

Subscribe free and never miss a daily threat briefing.