2nd March – Threat Intelligence Report
The 2nd March Threat Intelligence Report from Check Point Research details multiple cyber threats and vulnerabilities impacting diverse sectors globally. Notable incidents include data breaches at Wynn Resorts and ManoMano, ransomware attacks targeting the Transport Workers Union of America by the Qilin group, and critical vulnerabilities in AI platforms such as Anthropic's Claude Code enabling remote code execution and credential theft. High-severity vulnerabilities in widely used software like Roundcube Webmail and SolarWinds Web Help Desk allow remote code execution and authentication bypass, with some exploited in the wild. A critical authentication bypass in Cisco Catalyst SD-WAN Controller has been actively exploited for years, prompting emergency patching directives. The report also highlights ongoing threat actor activity linked to Iranian groups, Lazarus-linked ransomware operations, and emerging AI misuse attempts. Protection is available through Check Point’s IPS and endpoint solutions. Organizations worldwide face risks to data confidentiality, operational integrity, and service availability from these multifaceted threats.
AI Analysis
Technical Summary
The Check Point Research 2nd March Threat Intelligence Report provides an extensive overview of recent cyber threats and vulnerabilities affecting multiple industries and geographies. Key incidents include a data breach at Wynn Resorts where employee HR data was accessed following extortion attempts linked to the ShinyHunters group, though operational disruption was avoided. UFP Technologies suffered a cyberattack causing data exfiltration and operational disruptions. The Transport Workers Union of America was targeted by the Qilin ransomware group, exposing personal data of 67,000 members. European marketplace ManoMano reported a breach via a third-party support portal, exposing customer contact information but not payment data. Critical vulnerabilities were discovered in AI systems, notably Anthropic’s Claude Code, allowing remote code execution and API key theft, which could enable attackers to manipulate shared workspaces and extract sensitive workflows. These vulnerabilities were patched (e.g., CVE-2025-59536). Malicious AI usage attempts, including influence operations linked to Chinese law enforcement targeting Japan’s prime minister, were also reported. Two Roundcube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) enable post-auth remote code execution and unauthenticated cross-site scripting, affecting global deployments including cPanel environments. SolarWinds Web Help Desk suffers from a pre-authentication remote code execution chain (CVE-2025-40552, CVE-2025-40554, CVE-2025-40553) allowing full server takeover without credentials. A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (CVE-2026-20127, CVSS 10) has been exploited in the wild for years, enabling attackers to gain high privileges and root access, prompting CISA emergency directives. The report also outlines Iranian threat actor clusters active in the Middle East and US, Lazarus-linked ransomware campaigns using Medusa ransomware, and GrayCharlie malware targeting WordPress sites through JavaScript injection and fake updates. Check Point’s IPS and endpoint security solutions provide protection against many of these threats. The report underscores the evolving threat landscape involving ransomware, AI exploitation, and sophisticated state-linked operations.
Potential Impact
The threats detailed in this report pose significant risks to organizations worldwide across multiple sectors including hospitality, manufacturing, transportation, e-commerce, and critical infrastructure. Data breaches at Wynn Resorts and ManoMano compromise employee and customer personal information, increasing risks of identity theft, fraud, and reputational damage. Ransomware attacks on the Transport Workers Union threaten operational continuity and expose sensitive member data, potentially disrupting essential transit services. Vulnerabilities in widely deployed software like Roundcube Webmail and SolarWinds Web Help Desk enable attackers to execute remote code and gain unauthorized access, risking full system compromise, data theft, and service outages. The critical Cisco Catalyst SD-WAN Controller flaw allows persistent, high-privilege access to network infrastructure, threatening network integrity and availability. AI platform vulnerabilities and misuse attempts raise concerns about intellectual property theft, unauthorized data access, and manipulation of AI-driven workflows, potentially impacting organizations relying on AI for critical operations. State-linked threat actor activity and ransomware campaigns increase geopolitical risk and complicate defense efforts. Collectively, these threats can lead to financial losses, operational disruptions, regulatory penalties, and erosion of stakeholder trust.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to the specific threats identified. Immediate patching of critical vulnerabilities is essential, particularly for Cisco Catalyst SD-WAN Controllers, SolarWinds Web Help Desk, and Roundcube Webmail deployments, prioritizing those exposed to external networks. Employ network segmentation and strict access controls to limit lateral movement in case of compromise. Deploy advanced endpoint protection and intrusion prevention systems, such as Check Point Harmony Endpoint and IPS, to detect and block ransomware and remote code execution attempts. For AI platforms, enforce strict project configuration validation, rotate API credentials regularly, and monitor for anomalous usage patterns indicative of credential theft or model extraction. Conduct thorough third-party risk assessments, especially for customer support portals and outsourced services, to prevent supply chain breaches. Enhance monitoring and incident response capabilities to rapidly detect and contain breaches, including anomaly detection for unusual authentication or data exfiltration activities. Educate employees on phishing and social engineering tactics linked to ransomware and credential theft. Finally, maintain comprehensive backups with offline copies to mitigate ransomware impact and ensure business continuity.
Affected Countries
United States, France, United Kingdom, Germany, Japan, China, Israel, United Arab Emirates, Iran, South Korea, Canada
2nd March – Threat Intelligence Report
Description
The 2nd March Threat Intelligence Report from Check Point Research details multiple cyber threats and vulnerabilities impacting diverse sectors globally. Notable incidents include data breaches at Wynn Resorts and ManoMano, ransomware attacks targeting the Transport Workers Union of America by the Qilin group, and critical vulnerabilities in AI platforms such as Anthropic's Claude Code enabling remote code execution and credential theft. High-severity vulnerabilities in widely used software like Roundcube Webmail and SolarWinds Web Help Desk allow remote code execution and authentication bypass, with some exploited in the wild. A critical authentication bypass in Cisco Catalyst SD-WAN Controller has been actively exploited for years, prompting emergency patching directives. The report also highlights ongoing threat actor activity linked to Iranian groups, Lazarus-linked ransomware operations, and emerging AI misuse attempts. Protection is available through Check Point’s IPS and endpoint solutions. Organizations worldwide face risks to data confidentiality, operational integrity, and service availability from these multifaceted threats.
AI-Powered Analysis
Technical Analysis
The Check Point Research 2nd March Threat Intelligence Report provides an extensive overview of recent cyber threats and vulnerabilities affecting multiple industries and geographies. Key incidents include a data breach at Wynn Resorts where employee HR data was accessed following extortion attempts linked to the ShinyHunters group, though operational disruption was avoided. UFP Technologies suffered a cyberattack causing data exfiltration and operational disruptions. The Transport Workers Union of America was targeted by the Qilin ransomware group, exposing personal data of 67,000 members. European marketplace ManoMano reported a breach via a third-party support portal, exposing customer contact information but not payment data. Critical vulnerabilities were discovered in AI systems, notably Anthropic’s Claude Code, allowing remote code execution and API key theft, which could enable attackers to manipulate shared workspaces and extract sensitive workflows. These vulnerabilities were patched (e.g., CVE-2025-59536). Malicious AI usage attempts, including influence operations linked to Chinese law enforcement targeting Japan’s prime minister, were also reported. Two Roundcube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) enable post-auth remote code execution and unauthenticated cross-site scripting, affecting global deployments including cPanel environments. SolarWinds Web Help Desk suffers from a pre-authentication remote code execution chain (CVE-2025-40552, CVE-2025-40554, CVE-2025-40553) allowing full server takeover without credentials. A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (CVE-2026-20127, CVSS 10) has been exploited in the wild for years, enabling attackers to gain high privileges and root access, prompting CISA emergency directives. The report also outlines Iranian threat actor clusters active in the Middle East and US, Lazarus-linked ransomware campaigns using Medusa ransomware, and GrayCharlie malware targeting WordPress sites through JavaScript injection and fake updates. Check Point’s IPS and endpoint security solutions provide protection against many of these threats. The report underscores the evolving threat landscape involving ransomware, AI exploitation, and sophisticated state-linked operations.
Potential Impact
The threats detailed in this report pose significant risks to organizations worldwide across multiple sectors including hospitality, manufacturing, transportation, e-commerce, and critical infrastructure. Data breaches at Wynn Resorts and ManoMano compromise employee and customer personal information, increasing risks of identity theft, fraud, and reputational damage. Ransomware attacks on the Transport Workers Union threaten operational continuity and expose sensitive member data, potentially disrupting essential transit services. Vulnerabilities in widely deployed software like Roundcube Webmail and SolarWinds Web Help Desk enable attackers to execute remote code and gain unauthorized access, risking full system compromise, data theft, and service outages. The critical Cisco Catalyst SD-WAN Controller flaw allows persistent, high-privilege access to network infrastructure, threatening network integrity and availability. AI platform vulnerabilities and misuse attempts raise concerns about intellectual property theft, unauthorized data access, and manipulation of AI-driven workflows, potentially impacting organizations relying on AI for critical operations. State-linked threat actor activity and ransomware campaigns increase geopolitical risk and complicate defense efforts. Collectively, these threats can lead to financial losses, operational disruptions, regulatory penalties, and erosion of stakeholder trust.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to the specific threats identified. Immediate patching of critical vulnerabilities is essential, particularly for Cisco Catalyst SD-WAN Controllers, SolarWinds Web Help Desk, and Roundcube Webmail deployments, prioritizing those exposed to external networks. Employ network segmentation and strict access controls to limit lateral movement in case of compromise. Deploy advanced endpoint protection and intrusion prevention systems, such as Check Point Harmony Endpoint and IPS, to detect and block ransomware and remote code execution attempts. For AI platforms, enforce strict project configuration validation, rotate API credentials regularly, and monitor for anomalous usage patterns indicative of credential theft or model extraction. Conduct thorough third-party risk assessments, especially for customer support portals and outsourced services, to prevent supply chain breaches. Enhance monitoring and incident response capabilities to rapidly detect and contain breaches, including anomaly detection for unusual authentication or data exfiltration activities. Educate employees on phishing and social engineering tactics linked to ransomware and credential theft. Finally, maintain comprehensive backups with offline copies to mitigate ransomware impact and ensure business continuity.
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2026/2nd-march-threat-intelligence-report/","fetched":true,"fetchedAt":"2026-03-02T16:42:03.368Z","wordCount":940}
Threat ID: 69a5bddb32ffcdb8a2768b71
Added to database: 3/2/2026, 4:42:03 PM
Last enriched: 3/2/2026, 4:42:21 PM
Last updated: 3/2/2026, 9:06:18 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant
LowCVE-2026-0995: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Arm C1 Pro
LowOpenClaw Vulnerability Allowed Websites to Hijack AI Agents
LowCVE-2026-3405: Path Traversal in thinkgem JeeSite
LowCVE-2026-3404: XML External Entity Reference in thinkgem JeeSite
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.