- NitrogenRansomware group claiming responsibility for Foxconn data theft; emerged 2023, connected to ALPHV/BlackCat.
- Conti 2Code base used to build Nitrogen's ransomware program.
- LockBitRansomware group that hit Foxconn facilities in Mexico (May 2022) and Foxsemicon subsidiary (2024).
- DoppelPaymerRansomware group that targeted Foxconn Mexican facility in December 2020.
ThreatNoir Morning Brief — May 13
Morning Review in IT Security — May 13, 2026
Today's threat landscape continues to evolve with significant developments across supply chain security, critical vulnerabilities in enterprise infrastructure, and routine patching cycles. Organizations face mounting pressure from both sophisticated threat actors and the relentless discovery of new security flaws in widely deployed systems.
Foxconn Ransomware Attack Shows Nothing Is Safe Forever
Foxconn, the renowned manufacturer behind Apple's iPhone production, has fallen victim to another ransomware attack, underscoring the persistent vulnerability of even the most security-conscious organizations. The incident highlights the critical risks associated with storing some of the world's most valuable intellectual property and operational data within supply chain networks. Source: Foxconn Ransomware Attack Shows Nothing Is Safe Forever
The attack involved multiple malware variants including Conti 2, DoppelPaymer, LockBit, and Nitrogen, demonstrating the sophisticated arsenal available to threat actors targeting high-value manufacturing operations. This incident reinforces the reality that comprehensive security measures remain insufficient against determined adversaries with access to advanced attack tools and techniques.
Two New Microsoft Windows Zero-Day Vulnerabilities Disclosed
Security researchers have identified two critical zero-day vulnerabilities affecting Microsoft Windows systems with operational exploit code available. The vulnerabilities, designated GreenPlasma and YellowKey, represent significant threats to Windows environments. Source: Yippie
GreenPlasma affects CTFMON and enables arbitrary section creation leading to elevation of privileges, while YellowKey represents a Bitlocker bypass vulnerability. The availability of detailed exploit information for these flaws creates an immediate risk window for organizations before patches become available.
Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator
Fortinet has released security patches addressing four critical remote code execution vulnerabilities affecting FortiSandbox and FortiAuthenticator products. The affected vulnerabilities are tracked as CVE-2026-21643, CVE-2026-26083, CVE-2026-35616, and CVE-2026-44277. Source: Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator
These flaws enable attackers to execute arbitrary commands on affected systems, presenting a severe risk to organizations relying on Fortinet's security and authentication infrastructure. The critical nature of these vulnerabilities necessitates immediate patching across all affected deployments.
Microsoft May 2026 Patch Tuesday Fixes 120 Flaws, No Zero-Days
Microsoft's May 2026 Patch Tuesday release addresses 120 security vulnerabilities across its product portfolio, with no zero-day exploits disclosed during this cycle. The updates cover multiple CVEs including CVE-2025-54518, CVE-2026-32175, CVE-2026-32177, CVE-2026-35421, CVE-2026-35433, CVE-2026-40365, and CVE-2026-41096. Source: Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days
The absence of zero-day disclosures provides a brief respite from emergency patching requirements, though the volume of fixes underscores the ongoing challenge of vulnerability management in enterprise environments.
Security teams face a demanding day ahead with multiple critical issues requiring immediate attention, from supply chain threats to enterprise infrastructure vulnerabilities and routine patch deployment obligations.
Sources & IOCs
Source articles and extracted indicators (defanged where appropriate).
- YellowKeyBitLocker bypass vulnerability
- GreenPlasmaWindows CTFMON arbitrary section creation EoP vulnerability
- FortiClient EMS critical flaw actively exploited in February
- Missing authorization in FortiSandbox allowing unauthenticated RCE
- Improper Access Control in FortiAuthenticator allowing unauthenticated RCE
- FortiClient EMS authentication bypass, CISA directive issued April 2026
- Windows DNS Client Remote Code Execution via malicious DNS response
- Windows GDI Remote Code Execution via malicious EMF files in Microsoft Paint
- Microsoft SharePoint Server Remote Code Execution by authenticated attacker
- .NET Elevation of Privilege Vulnerability
- .NET Elevation of Privilege Vulnerability
- .NET Core Tampering Vulnerability
- AMD CPU OP Cache Corruption on Zen 2-based processors