Skip to content

A Day In Cybercrime: May 19, 2026

Kirk
5 min read
threat-intelc2ransomwareinfrastructuresupply-chaindns
On this page

News

Nx Console 18.95.0 Compromised (2026-05-19 08:16 UTC)

A compromised version of the Nx Console VS Code extension was pushed with build 18.95.0, packing a credential stealer aimed at developers who use the Nx monorepo tooling. The Hacker News (opens in new tab)

GitHub Actions Tag Hijack (2026-05-19 06:16 UTC)

The actions-cool/issues-helper workflow had its tags redirected to an imposter commit designed to steal CI/CD credentials from downstream repos. Another reminder that pinning action hashes matters more than tagging. The Hacker News (opens in new tab)

Mini Shai-Hulud Pushes Malicious npm Packages (2026-05-19 05:16 UTC)

The @antv npm namespace took a hit when a maintainer account was compromised and malicious packages were published under the legitimate AntV visualization library group. The Hacker News (opens in new tab)

Patch Roundup: Ivanti, Fortinet, SAP, VMware, n8n (May 18, 2026)

Ivanti, Fortinet, n8n, SAP, and VMware all released fixes for RCE, SQL injection, and privilege escalation vulnerabilities. Standard rotation, multiple critical-severity items. The Hacker News (opens in new tab)

Microsoft: Patching Issues on Restricted Networks (2026-05-19 12:16 UTC)

Windows Update is failing on restricted networks after the January 2026 optional non-security preview update, Microsoft confirmed. Enterprise environments behind strict firewall rules are the ones hitting this. Bleeping Computer (opens in new tab)

Ransomware Claims

Nine groups logged 37 new claims in the last 24 hours across 16 countries and 11 sectors.

Safepay, Thegentlemen, and Titan each posted 7. Nightspire had 5, Nova and Payload posted 3 each, Qilin and Akira had 2, and Rhysida put up 1.

Manufacturing took the most sector hits with 8, followed by Business Services at 7, Consumer Services at 4, and Technology at 3. The US was the top-targeted country at 8 claims, Germany and the UK at 4 each, Singapore at 3, then France and Austria at 2.

C2 Observations

217 C2 observations landed across 49 family labels from 166 unique hosts. VShell had the most at 29, followed by AsyncRAT at 24, Cobalt Strike at 21, and KimWolf at 19. Mirai and Remus each had 10.

Shared Hosts

Several hosts carry multiple family labels.

HostFamiliesAS / Country
hakim32[.]ddns[.]netAsyncRAT, DarkTortilla, NanoCore, Neshta, njRAT, RatOnRat, Remcos, VenomRAT, XWormLeaseWeb NL, sinkhole
62[.]60[.]226[.]159Amadey, RedLine, SmokeLoader, Stealc, SvcStealer, TinyLoader, XMRig, XWormFEMO IT, GB
drive[.]google[.]comDanaBot, DarkComet, GuLoader, ModiLoader, Remcos, RevengeRAT, Warzone RATGoogle, US
196[.]251[.]107[.]130Amadey, RedLine, Stealc, SvcStealer, XMRig, XWormFEMO IT, GB
196[.]251[.]107[.]104Amadey, RedLine, Stealc, SvcStealer, XWormFEMO IT, GB
firewai[.]bizHijackLoader, Remus, Remus StealerContabo, DE
mascard[.]bizHijackLoader, Remus, Remus StealerDigitalOcean, US
woodfez[.]bizHijackLoader, Remus, Remus StealerHostinger, CY
carytui[.]vuGhostSocks, HijackLoader, Lumma, SectopRATGreat Flower, IL
decrnoj[.]clubGhostSocks, HijackLoader, Lumma, SectopRATGreat Flower, IL

FEMO IT's three IPs carry the densest combination: stealer, loader, miner, and RAT labels overlapping across the same addresses. The Great Flower set mirrors four labels across five domains. hakim32[.]ddns[.]net is a sinkhole saddled with so many malware labels it reads like a greatest-hits list.

Quad9 DNS Activity

Over the last 24 hours, Derp identified 217 C2 observations across 49 malware families. Derp C2 intelligence is used to help protect Quad9 users from reaching active C2 infrastructure. These events represent infected systems attempting to reach C2 hosts and Quad9 blocking the connection path.

Top 10 New Quad9 C2 Blocks (24hour)

HostFamiliesBlocked C2 eventsTop countries
f****er1[.]duckdns[.]orgMirai2,088DE, US, RU, SE, AT
skytrust[.]ioAsyncRAT534US, CH, FR, RU, VE
firewai[.]bizHijackLoader, Remus, Remus Stealer376FR, US, CH, ID, RU
mascard[.]bizHijackLoader, Remus, Remus Stealer319FR, CH, ID, RU, BD
woodfez[.]bizHijackLoader, Remus, Remus Stealer281FR, CH, RU, ID, US
losslvs[.]surfRemus267DE, CH, RU, US, FR
doctopus[.]ioAsyncRAT168US, DE, RU, BR, VN
69sexy[.]duckdns[.]orgMirai163DE, NZ, NO, US
newenewmew[.]duckdns[.]orgMirai157DE, US
tokenguard[.]ioAsyncRAT94US, FR, RU, PL, DE

Top 10 All C2 DB Quad9 C2 Blocks (24hour)

HostBlocked C2 eventsTop countries
ff[.]jjkk567[.]com405,003DE, US
ff[.]xxcc789[.]com404,989DE, US
ff[.]nnmm234[.]com404,962DE, US
ff[.]aass654[.]com404,961DE, US
ff[.]vvbb321[.]com404,960DE, US
hh[.]jjkk567[.]com345,069LK, US, IN
hh[.]nnmm234[.]com345,002LK, US
hh[.]aass654[.]com344,995LK, US
hh[.]xxcc789[.]com344,993LK, US, IN
cloudguardservice[.]duckdns[.]org191,225ZA, BW, US, NL

Infrastructure

166 malware download hosts mapped to 25 countries and 67 providers. Hosting networks carried 147 download hosts, ISP space held 16, business networks had 2, and one was a sinkhole.

ProviderDownload hosts
Cloudflare31
DigitalOcean25
Tencent12
Alibaba CN8
Great Flower6
Omegatech4
Alibaba US3
FEMO IT3
Pfcloud3

The US hosted 76 malware download hosts, China had 28, the UK 11, and Germany 7. Cloudflare and DigitalOcean alone accounted for a third of the tracked malware download infrastructure.

Latest From Derp

Share this article