zerofox logo
Advisories

ZeroFox Daily Intelligence Brief - March 11, 2026

|by Alpha Team

banner image

ZeroFox Daily Intelligence Brief - March 11, 2026

ZeroFox Intelligence collects, curates, and analyzes information derived from open and proprietary sources. Here is today’s daily roundup to give you and your clients an advantage over the adversary.

Brief Highlights

  • Lazarus Uses Deepfaked Recruiter in Fake Interview; Gets Caught
  • Poland Uncovers Minors Selling DDoS Tools
  • Iran SITREP - U.S. Hits Minelaying Vessels, Chinese Hackers Target Energy Industry

Lazarus Uses Deepfaked Recruiter in Fake Interview; Gets Caught

Source: https://hackread.com/fake-linkedin-interview-lazarus-hackers-allsecure-ceo/

What we know: North Korean threat group Lazarus Group targeted a security company’s CEO through a fake job interview arranged via a popular job portal. They tried to trick the CEO into opening a malicious coding project in Visual Studio Code as part of a fake technical interview with a recruiter impersonating a real person for the “interview.”

Context: The CEO suspected a deepfake impersonation after noticing that the recruiter’s voice did not match the real individual’s voice in publicly available videos. Additionally, the project contained the group’s BeaverTail malware, but the CEO analyzed it in a sandbox, prompting the attackers to activate a kill switch and erase activity.

Analyst note: A CEO’s laptop typically contains privileged emails, credentials, and internal documents that are likely to enable further infiltration or intelligence gathering. Lazarus was likely trying to collect intelligence on security defenses and potentially gain access to networks monitored or protected by the CEO’s company, which can enable them to improve future cyber operations.

Poland Uncovers Minors Selling DDoS Tools

Source: https://cbzc.policja.gov.pl/bzc/aktualnosci/849,Siedmiu-nastolatkow-sprzedawalo-narzedzia-do-atakow-DDoS.html

What we know: Poland’s cyber police has identified seven minors who allegedly ran a scheme selling tools used to conduct distributed denial-of-service (DDoS) attacks. The suspects sold the tools that were reportedly used to target popular websites, including auction platforms, hosting services, IT domains, and accommodation booking sites.

Context: During the searches, officers seized smartphones, laptops, storage drives, a ledger, and handwritten notes, along with tools and infrastructure allegedly used to launch DDoS attacks. Because the suspects are minors, the case will be handled by family courts to determine further action.

Analyst note: It is likely that the suspects sold these tools to buyers that wanted to disrupt websites to cause them operational harm and disrupt transactions. Seizing the infrastructure is likely to provide law enforcement information to identify affected businesses and uncover other cybercrimes that the DDoS attacks veiled.

Iran SITREP - U.S. Hits Minelaying Vessels, Chinese Hackers Target Energy Industry

DEEP AND DARK WEB INTELLIGENCE

Exploit user privisnanet: An untested threat actor named "privisnanet" has advertised AnyDesk access to five Point-of-Sale (POS) terminals of an undisclosed company based in New York on dark web forum Exploit. The starting bid for the access starts at USD 200, with an instant purchase price of USD 1,000. If the offer is legitimate, the access is likely to enable threat actors to remotely view and manipulate the victim entity’s financial transactions. This is likely to result in financial losses as well as the exposure of customers’ financial data.

VULNERABILITY AND EXPLOIT INTELLIGENCE

Microsoft patch Tuesday March 2026: Microsoft patched 84 vulnerabilities across its products for March 2026 patch Tuesday, including eight critical and two publicly known flaws. Among the patched vulnerabilities is CVE-2026-26144, a cross-site scripting flaw in Microsoft Excel that can enable a zero-click information disclosure attack via Copilot Agent. Successful exploitation of any of the flaws, individually or in a chain, is likely to lead to remote attacks resulting in data theft and corruption, disruptions to operations, and other consequences.

Affected products: The affected products are listed in this advisory.

Tags: DIBtlp:green