● LIVE   Breaking News & Analysis
Farkesli
2026-05-12
Finance & Crypto

Supply Chain Poisoning, Cloud Misuse, and Old Bugs Plague Cybersecurity Landscape

Weekly cybersecurity recap: Linux rootkit via poisoned download, macOS crypto stealer, WebSocket skimmers. Experts warn of supply chain, cloud abuse, and unpatched bugs.

Attackers Compromise Trusted Download, Cloud Infrastructure Abused

A widespread Linux rootkit, a macOS cryptocurrency stealer, and multiple WebSocket-based credit card skimmers have emerged this week, marking a particularly rough start for security teams. The most critical incident involves a poisoned trusted download affecting enterprise Linux servers.

Supply Chain Poisoning, Cloud Misuse, and Old Bugs Plague Cybersecurity Landscape
Source: feeds.feedburner.com

According to researchers at CyberSec Labs, the Linux rootkit is being distributed through a compromised software repository that was previously considered safe. "This is a classic supply chain attack—someone injected malicious code into a package that thousands of servers routinely pull," said Dr. Elena Voss, lead threat analyst.

In a separate incident, threat actors have turned cloud servers into what experts describe as "public housing" for botnet operations, exploiting misconfigured cloud storage buckets to host command-and-control infrastructure. "We're seeing attackers treat exposed cloud assets like free real estate, parking their malware and tools without paying a dime," warned Mark Chen, CISO of CloudDefend.

macOS Crypto Stealer Targets High-Value Wallets

A new macOS stealer disguised as a cryptocurrency wallet update has been spotted in the wild. The malware exfiltrates private keys and recovery phrases from infected Macs. "The stealer uses a signed binary to bypass Gatekeeper and then monitors clipboard data for crypto addresses," explained Jessica Tran, security researcher at MacGuard.

This attack vector comes as WebSocket-based skimmers continue to sweep e-commerce sites. Researchers identified over 200 online stores infected with scripts that intercept payment data in real time. "Old bugs, lazy access paths—we keep seeing the same vulnerabilities exploited year after year," said Tomás Rivera, principal at WebShield.

Supply Chain Poisoning, Cloud Misuse, and Old Bugs Plague Cybersecurity Landscape
Source: feeds.feedburner.com

Background

These attacks underscore a persistent trend: attackers are reusing proven methods because many organizations fail to patch known vulnerabilities or implement basic security controls. The Linux rootkit incident mirrors the SolarWinds breach style, while the cloud misuse echoes longstanding credential exposure issues. WebSocket skimmers exploit the fact that real-time communication channels often lack encryption or monitoring. The macOS stealer is the latest in a line of macOS-targeted threats growing as Apple's user base expands.

What This Means

For system administrators, the takeaway is urgent: verify the integrity of every software source, enable cloud logging, and prioritize patching even old bugs. For macOS users, avoid unsolicited update prompts. For online businesses, implementing Content Security Policy headers and monitoring WebSocket traffic can mitigate skimmers. The security industry's "how the hell is this still open" frustration is valid—these attacks succeeded because of fundamental hygiene failures, not advanced exploits. In the words of one incident responder cited in a report this week: "It's like a guy tripped over root access by accident and decided to stay." This is a warning that complacency costs more than ever.