ARTICLE
16 March 2026

Ankura CTIX FLASH Update – March 10, 2026

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers services and end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura has more than 2,000 professionals serving 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover ValueTM. For more information, please visit, ankura.com.
Cybercriminals are increasingly exploiting core internet functions, such as the ".arpa" domain and IPv6 reverse DNS features, to conduct stealthy and sophisticated phishing attacks.
United States Technology
Ankura Consulting Group LLC are most popular:
  • within Antitrust/Competition Law, About Mondaq and Insolvency/Bankruptcy/Re-Structuring topic(s)

Malware Activity

Exploiting Internet Infrastructure and Advanced Hacking Techniques

Cybercriminals are increasingly exploiting core internet functions, such as the ".arpa" domain and IPv6 reverse DNS features, to conduct stealthy and sophisticated phishing attacks. These attackers hijack DNS zones by controlling large IPv6 address blocks and creating fake but convincing hostnames that appear legitimate, often using trusted providers to mask their activities. This tactic leverages the inherent trust in reverse DNS lookups to bypass security filters, making it harder for traditional defenses to detect malicious links, which are often designed to be temporary. Meanwhile, a notorious hacking group known as Velvet Tempest is employing advanced social engineering methods, such as the ClickFix technique, to infiltrate organizations. They trick users into executing malicious commands via online ads, then use these to establish backdoors, steal credentials, and deploy malware like DonutLoader and CastleRAT. While they usually carry out ransomware attacks, in recent simulated scenarios, their focus has been on creating persistent access points for future intrusions. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Microsoft Reports AI's Role is Becoming Amplified in Cyberattacks

A recent report by Microsoft Threat Intelligence highlights the increasing use of artificial intelligence (AI) by threat actors to enhance and scale cyberattacks. Attackers leverage generative AI tools for tasks like reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activities. AI aids in drafting phishing emails, translating content, summarizing data, debugging malware, and configuring infrastructure, acting as a force multiplier that reduces technical barriers and accelerates attacks. Specific groups like North Korean actors Jasper Sleet and Coral Sleet use AI to develop realistic identities and resumes for gaining employment at Western companies, maintaining access post-hire. Jasper Sleet uses AI to create fraudulent digital personas, while Coral Sleet generates fake company sites and infrastructure. Threat actors also use AI for malware development, generating and refining malicious code, and employing AI-enabled malware that dynamically adjusts its behavior. Despite AI safeguards, actors use jailbreaking techniques to circumvent restrictions and generate malicious content. Microsoft notes that AI is currently used more for decision-making rather than autonomous attacks. CTIX Analysts advise organizations to treat these AI-driven schemes as insider risks and focus on detecting abnormal credential use, securing identity systems, and protecting AI systems. Microsoft's observations align with reports from Google and Amazon, indicating a broader trend of AI being used to lower entry barriers for cybercriminals and enhance attack capabilities. Microsoft Defender detection rules for these activities can be found in the Microsoft report listed below.

Vulnerabilities

OpenAI Launches Codex Security AI Agent to Detect and Remediate Software Vulnerabilities

OpenAI introduced Codex Security, an AI-powered security agent designed to automatically identify, validate, and propose fixes for vulnerabilities in software codebases. Released in a research preview to ChatGPT Pro, Enterprise, Business, and Edu users via the Codex web interface, the tool builds deep contextual understanding of a project to uncover complex security issues that traditional automated scanners may miss while reducing noise from insignificant findings. Codex Security evolved from OpenAI's earlier Aardvark project introduced in private beta in October 2025 and combines advanced model reasoning with automated validation workflows. During the past month of beta testing, the system analyzed over 1.2 million commits across external repositories, identifying 792 critical and 10,561 high-severity vulnerabilities in widely used open-source projects such as OpenSSH, GnuTLS, GOGS, Thorium, libssh, PHP, and Chromium, including issues tracked as CVE-2026-24881, CVE-2026-24882, and CVE-2025-32988. The platform operates through a three-stage process. First, it analyzes repository structure to generate a security-focused threat model, then detects and classifies vulnerabilities based on real-world impact, and finally validating them in a sandboxed environment to reduce false positives and potentially generate proof-of-concept exploits. Once verified, the agent proposes fixes aligned with system behavior to minimize regressions and streamline remediation. OpenAI reports that repeated scans have improved precision significantly, cutting false positives by more than half, positioning Codex Security as part of the emerging class of AI-driven application security tools alongside offerings like Anthropic's Claude Code Security. CTIX analysts will continue to report on novel vulnerabilities and the ways in which they can be defended against.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More