zerofox logo
Advisories

ZeroFox Daily Intelligence Brief - March 17, 2026

|by Alpha Team

banner image

ZeroFox Daily Intelligence Brief - March 17, 2026

ZeroFox Intelligence collects, curates, and analyzes information derived from open and proprietary sources. Here is today’s daily roundup to give you and your clients an advantage over the adversary.

Brief Highlights

  • Iran SITREP: Blast at UAE Oil Field, 245 Percent Increase in Cybercrime
  • INTERPOL to Launch Operation Shadow Storm
  • Operation ATLANTIC Targets Crypto Theft via Approval Phishing

Iran SITREP: Blast at UAE Oil Field, 245 Percent Increase in Cybercrime

INTERPOL to Launch Operation Shadow Storm

Source: https://www.interpol.int/News-and-Events/News/2026/INTERPOL-report-warns-of-increasingly-sophisticated-global-financial-fraud-threat

What we know: INTERPOL is launching Operation Shadow Storm to crack down on hard-to-trace criminal leaders behind expanding scam centres. The organization disclosed how co-ordinated crime networks are using novel cybercriminal ways including AI-automated frauds, sextortion, and crypto-scams in "polycriminality," some of which even funds terrorist groups.

Context: Operation Shadow Storm will focus on cybercriminals running regional scam centres that mostly consist of trafficked humans who are forced into committing large-scale online frauds. These criminal leaders hide their tracks using intermediaries and shell companies, even when scam centres are seemingly shut down.

Analyst Note: Information deduced from this operation will likely help track down links to similar networks in different parts of the world. These criminals often have secret communication channels and devices that are likely to undergo advanced forensic analysis to prepare future defense strategies.

Operation ATLANTIC Targets Crypto Theft via Approval Phishing

Source: https://www.nationalcrimeagency.gov.uk/news/operation-atlantic

What we know: Law enforcement agencies have launched Operation ATLANTIC to identify victims of crypto asset theft through approval phishing scams and help prevent further losses. The operation also aims to recover stolen funds and dismantle fraud networks that exploit users by gaining unauthorized access to their crypto wallets.

Context: Approval phishing scams and fake investment schemes use fake prompts posing as trusted services to trick victims into approving wallet access, enabling attackers to drain funds through unauthorized transactions that are typically irreversible and hard to recover.

Analyst Note: It is likely that victims of certain scams like pig butchering are already trapped and are particularly vulnerable to approval phishing scams, as prolonged manipulation increases the likelihood of approving malicious access requests.

DEEP AND DARK WEB INTELLIGENCE

RehubCom user t2m3g: Untested threat actor "t2m3g" has advertised cloud console and remote desktop protocol (RDP) access to FIFA-related servers on Russian-language dark web forum RehubCom. The actor did not disclose pricing or proof of access, instead inviting potential buyers to make contact via private messages. If the claims are true, access to systems linked to FIFA could expose important communications, event planning, or vendor data.

VULNERABILITY AND EXPLOIT INTELLIGENCE

CVE-2025-47813: CISA has warned U.S. agencies of an already patched vulnerability which can still be exploited as part of a chained remote code execution (RCE) attack. This high-severity information disclosure flaw in Wing FTP Server enables low-privileged actors to leak the application's local installation path via a malformed UID cookie. When combined with other critical bugs like CVE-2025-47812 and CVE-2025-27889, it enables attackers to steal passwords and execute arbitrary code on servers used by major global organizations.

Affected products: Wing FTP Server versions prior to 7.4.4

Tags: DIBtlp:green