Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

23rd March – Threat Intelligence Report

0
Medium
Vulnerability
Published: Mon Mar 23 2026 (03/23/2026, 13:38:09 UTC)
Source: Check Point Research

Description

The 23rd March 2026 Threat Intelligence Report from Check Point Research details multiple significant cyber incidents and vulnerabilities affecting various sectors worldwide. Key breaches include Navia Benefit Solutions, exposing over 2. 6 million individuals' personal and health data, and targeted phishing attacks against Aura and Intuitive, compromising employee and customer information. Critical vulnerabilities such as CVE-2026-33017 in Langflow and CVE-2026-3564 in ConnectWise ScreenConnect enable remote code execution and unauthorized session authentication, respectively. The report also highlights emerging AI-driven attack techniques, including stealthy prompt injections and data exfiltration in AI platforms like Anthropic’s Claude. ai. Supply chain attacks via backdoored React Native npm packages and active exploitation of flaws in widely used software like Zimbra and GNU InetUtils telnetd further exacerbate the threat landscape. These combined threats pose substantial risks to confidentiality, integrity, and availability across healthcare, IT services, critical infrastructure, and software development ecosystems worldwide.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 13:47:01 UTC

Technical Analysis

The Check Point Research 23rd March 2026 Threat Intelligence Report provides an extensive overview of recent cyber threats, breaches, and vulnerabilities impacting diverse sectors globally. Notably, Navia Benefit Solutions, a US-based employee benefits administrator, suffered a breach compromising over 2.6 million individuals' sensitive personal, health, and benefits data due to unauthorized access between December 2025 and January 2026. Similarly, Aura, an identity protection firm, was breached via a phone phishing attack that compromised an employee account and marketing platform, exposing approximately 900,000 records, primarily names and emails. The Puerto Rico Aqueduct and Sewer Authority confirmed a cyberattack exposing customer and employee data, though operational systems remained protected due to network segmentation. Intuitive, a robotic surgery company, experienced a phishing-driven breach exposing customer contacts, employee data, and corporate records, while critical surgical platforms remained unaffected. The report underscores the evolution of AI threats, highlighting a shift from human-led to AI-led attack chains. Researchers discovered a chained vulnerability in Anthropic’s Claude.ai enabling invisible prompt injection, silent exfiltration of conversation history, and open redirect exploitation, facilitating stealthy data theft. Additionally, CVE-2026-33017, a critical unauthenticated remote code execution vulnerability in Langflow, was weaponized within 20 hours of disclosure, allowing arbitrary Python code execution on exposed instances. Several critical vulnerabilities were patched or actively exploited: ConnectWise patched CVE-2026-3564, a cryptographic signature verification flaw in ScreenConnect that could allow unauthorized session authentication and privilege escalation; Ubiquiti addressed CVE-2026-22557, an unauthenticated path traversal bug in UniFi Network Application enabling file access and system compromise; Zimbra warned of active exploitation of CVE-2025-66376, a stored cross-site scripting flaw allowing code execution via malicious emails; and GNU InetUtils telnetd is affected by CVE-2026-32746, a remote code execution flaw exploitable without authentication, potentially granting root access on Linux, IoT, and industrial systems. The report also details a supply chain attack involving backdoored React Native npm packages that deployed credential and cryptocurrency theft malware with persistence, affecting over 130,000 combined downloads. Furthermore, an Interlock ransomware campaign exploited a zero-day in Cisco Secure Firewall Management Center (CVE-2026-20131) prior to its public disclosure. The Iranian APT group MuddyWater was linked to spear-phishing and malware campaigns, emphasizing ongoing geopolitical cyber threats. Overall, the report highlights a complex threat landscape combining traditional phishing, supply chain attacks, critical software vulnerabilities, and emerging AI-driven attack methodologies, demanding heightened vigilance and advanced defensive strategies.

Potential Impact

The threats detailed in this report have widespread implications for organizations globally, particularly those in healthcare, IT services, critical infrastructure, and software development. The Navia breach exposes millions to identity theft, fraud, and privacy violations, potentially leading to regulatory penalties and loss of customer trust. Phishing attacks compromising employee accounts at Aura and Intuitive demonstrate the persistent risk of social engineering leading to data breaches, affecting customer and corporate data confidentiality. Vulnerabilities like CVE-2026-33017 in Langflow and CVE-2026-3564 in ScreenConnect enable attackers to execute arbitrary code or gain unauthorized access, risking full system compromise, data theft, and lateral movement within networks. The exploitation of supply chain components, such as backdoored npm packages, threatens the integrity of software development pipelines, potentially introducing malware into numerous downstream applications and organizations. The active exploitation of flaws in widely deployed software like Zimbra and GNU InetUtils telnetd can lead to session hijacking, data theft, and root-level system control, severely impacting availability and operational continuity. The evolution of AI-powered attack chains increases the sophistication and stealth of cyberattacks, complicating detection and response efforts. Critical infrastructure entities like the Puerto Rico Aqueduct and Sewer Authority, while protected operationally, still face risks to business data and administrative environments, which can disrupt services indirectly. Collectively, these threats can cause significant financial losses, reputational damage, regulatory scrutiny, and operational disruptions worldwide.

Mitigation Recommendations

Organizations should implement multi-layered security controls tailored to the specific threats outlined. For phishing risks, enforce stringent email security protocols including DMARC, DKIM, and SPF, combined with continuous employee training and simulated phishing exercises to reduce susceptibility. Deploy robust multi-factor authentication (MFA) across all user accounts, especially for privileged and remote access. Patch management must be prioritized with rapid deployment of security updates for critical vulnerabilities such as CVE-2026-33017 (Langflow), CVE-2026-3564 (ScreenConnect), CVE-2026-22557 (Ubiquiti UniFi), CVE-2025-66376 (Zimbra), and CVE-2026-32746 (GNU InetUtils telnetd). Employ network segmentation and zero trust principles to limit lateral movement and isolate critical systems from business networks. Supply chain security should be enhanced by auditing third-party software dependencies, implementing strict code signing policies, and using software composition analysis tools to detect malicious packages. Monitor for unusual network activity indicative of AI-driven or stealthy exfiltration attempts, leveraging advanced endpoint detection and response (EDR) and AI-based threat hunting tools. For AI-related threats, collaborate with vendors to ensure timely patching of AI platforms and incorporate AI-specific security controls such as prompt injection detection and API usage monitoring. Regularly review and update incident response plans to address emerging AI-enabled attack vectors. Finally, maintain comprehensive logging and monitoring to detect early signs of compromise and enable rapid containment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/","fetched":true,"fetchedAt":"2026-03-23T13:46:41.702Z","wordCount":950}

Threat ID: 69c14441f4197a8e3b5e3e16

Added to database: 3/23/2026, 1:46:41 PM

Last enriched: 3/23/2026, 1:47:01 PM

Last updated: 3/23/2026, 3:23:18 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses