All Posts
Anomali Cyber Watch
Public Sector
1
min read

Network Appliances Under Siege: State Government IT Faces Maximum-Severity Exploitation Wave

Published on
April 20, 2026
Table of Contents
<p><strong>Threat Assessment Level: ELEVATED (Trending HIGH)</strong></p> <p><em>Previous assessment: ELEVATED (stable). Elevated trending HIGH due to confirmed active exploitation of a CVSS 10.0 vulnerability in Cisco Catalyst SD-WAN targeting government, expansion of Ivanti EPMM exploitation to a second distinct campaign, and emergence of a new ransomware family (REDBIKE) targeting government via SonicWall appliances.</em></p> <h2><strong>Executive Summary&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>A strategic shift is underway in how adversaries breach government networks. The dominant initial access vector is no longer phishing &mdash; it is <strong>direct exploitation of internet-facing network appliances</strong>. This week, four separate exploitation campaigns target perimeter devices commonly deployed across state and local government: Cisco SD-WAN, Ivanti EPMM, BeyondTrust, and SonicWall.</p> <p>The single most urgent finding: <strong>CVE-2026-20127</strong>, a CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN, is being actively exploited against government targets. Successful exploitation grants an attacker administrative control over the entire SD-WAN fabric &mdash; the ability to reroute traffic, create covert tunnels, or sever connectivity across your wide-area network.</p> <p>If your state operates Cisco Catalyst SD-WAN infrastructure, this is a <strong>drop-everything patching event</strong>.</p> <h2><strong>What Changed&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Development</p> </th> <th> <p>Why It Matters</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>Cisco SD-WAN CVE-2026-20127 (CVSS 10.0)</strong> confirmed exploited against government</p> </td> <td> <p>Attacker gains NETCONF access to manipulate entire network fabric &mdash; not just one host, but all routing and segmentation</p> </td> </tr> <tr> <td> <p><strong>Ivanti EPMM exploitation expands</strong> &mdash; second distinct campaign confirmed</p> </td> <td> <p>Two independent actor groups now exploiting CVE-2026-1281 and CVE-2026-1340 against government targets across 6+ countries</p> </td> </tr> <tr> <td> <p><strong>REDBIKE ransomware</strong> emerges via SonicWall exploitation</p> </td> <td> <p>New ransomware family explicitly targeting government, using network appliance compromise rather than phishing for initial access</p> </td> </tr> <tr> <td> <p><strong>BeyondTrust CVE-2026-1731 (CVSS 9.8)</strong> exploitation confirmed with Meterpreter payload</p> </td> <td> <p>Active exploitation of privileged remote access infrastructure delivering post-exploitation tooling directly into government environments</p> </td> </tr> <tr> <td> <p><strong>BlueNoroff (DPRK)</strong> registers fresh C2 domains mimicking Zoom/Teams/Meet</p> </td> <td> <p>Social engineering campaign likely imminent &mdash; credential harvesting via fake video conference invitations</p> </td> </tr> <tr> <td> <p><strong>Iranian espionage campaign</strong> active across 17 countries</p> </td> <td> <p>Government, energy, and utilities targeted with custom backdoors and legitimate remote access tools</p> </td> </tr> <tr> <td> <p><strong>DPRK Axios NPM supply chain compromise</strong> confirmed across 13 countries</p> </td> <td> <p>Software supply chain attack affecting healthcare and other sectors; malicious NPM packages delivering DPRK-linked payloads</p> </td> </tr> <tr> <td> <p><strong>4 new ICS/SCADA advisories</strong> from CISA</p> </td> <td> <p>Includes Anviz biometric access control systems used in government facilities and Horner PLCs common in municipal water/wastewater</p> </td> </tr> </tbody> </table> <h2><strong>Threat Timeline &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> <th> <p>Severity</p> </th> </tr> </thead> <tbody> <tr> <td> <p>2026-04-13</p> </td> <td> <p>CISA adds 7 vulnerabilities to Known Exploited Vulnerabilities catalog</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-14</p> </td> <td> <p>CISA adds 2 additional KEV entries</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-15</p> </td> <td> <p>REDBIKE ransomware campaign via SonicWall updated &mdash; government in target list</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-15</p> </td> <td> <p>Volt Typhoon intelligence last updated &mdash; activity ongoing</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-16</p> </td> <td> <p>CISA adds Ivanti EPMM CVE-2026-1281/1340 to KEV</p> </td> <td> <p>CRITICAL</p> </td> </tr> <tr> <td> <p>2026-04-16</p> </td> <td> <p>CISA publishes 4 ICS advisories (AVEVA, Horner, Delta, Anviz)</p> </td> <td> <p>MEDIUM-HIGH</p> </td> </tr> <tr> <td> <p>2026-04-17</p> </td> <td> <p>BeyondTrust CVE-2026-1731 exploitation confirmed with Meterpreter payload</p> </td> <td> <p>CRITICAL</p> </td> </tr> <tr> <td> <p>2026-04-17</p> </td> <td> <p>APT28 (Russian GRU) generates fresh attack infrastructure</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-18</p> </td> <td> <p>APT28 infrastructure activity continues</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-19</p> </td> <td> <p>Cisco SD-WAN CVE-2026-20127 exploitation campaign targeting government confirmed</p> </td> <td> <p>CRITICAL</p> </td> </tr> <tr> <td> <p>2026-04-19</p> </td> <td> <p>Second Ivanti EPMM exploitation campaign identified (6 countries, multiple verticals)</p> </td> <td> <p>CRITICAL</p> </td> </tr> <tr> <td> <p>2026-04-19</p> </td> <td> <p>Iranian espionage campaign updated &mdash; 17 countries, government/energy/utilities</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-19</p> </td> <td> <p>DPRK Axios NPM supply chain compromise confirmed (13 countries)</p> </td> <td> <p>HIGH</p> </td> </tr> <tr> <td> <p>2026-04-20</p> </td> <td> <p>BlueNoroff C2 domains observed: fake Zoom/Teams/Meet infrastructure</p> </td> <td> <p>HIGH</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>1. Cisco Catalyst SD-WAN: The Maximum-Severity Network Takeover (CVE-2026-20127)</strong></h3> <p><strong>CVSS 10.0 | CISA KEV Listed | Active Exploitation Against Government</strong></p> <p>CVE-2026-20127 is an authentication bypass in Cisco Catalyst SD-WAN Controller (vSmart) and SD-WAN Manager (vManage). An unauthenticated remote attacker can obtain admin-level access and manipulate NETCONF/network configuration for the entire SD-WAN overlay.</p> <p>This is not a typical &ldquo;get a shell on one box&rdquo; vulnerability. Exploitation grants the ability to:</p> <ul> <li>Reroute all traffic through attacker-controlled infrastructure</li> <li>Create covert tunnels bypassing all security controls</li> <li>Disrupt connectivity across the entire wide-area network</li> <li>Modify network segmentation to access previously isolated systems</li> </ul> <p>The capability profile &mdash; network infrastructure manipulation for pre-positioning &mdash; is precisely what <strong>Volt Typhoon</strong> (Chinese state-sponsored) has been documented pursuing with SOHO routers and edge devices. While the current campaign is attributed to &ldquo;unknown motivations,&rdquo; the government-specific targeting and network fabric manipulation capability are consistent with Chinese APT pre-positioning tradecraft.</p> <p><strong>ATT&amp;CK:</strong> T1190, T1078, T1565.002, T1599</p> <h3><strong>2. Ivanti EPMM: Two Campaigns, Two Actor Groups (CVE-2026-1281, CVE-2026-1340)</strong></h3> <p><strong>CVSS 9.8 each | CISA KEV Listed | Active Exploitation</strong></p> <p>Two independent campaigns are now confirmed exploiting Ivanti Endpoint Manager Mobile:</p> <ul> <li><strong>Campaign 1:</strong> Targeting financial services and government across 4 countries</li> <li><strong>Campaign 2:</strong> Targeting automotive, commercial, financial services, government, manufacturing, and transportation across 6 countries</li> </ul> <p>Both CVEs enable unauthenticated remote code execution via code injection. Ivanti EPMM manages mobile device fleets &mdash; compromise grants access to device configurations, credentials, and potentially the ability to push malicious profiles to managed devices.</p> <p>For state agencies using Ivanti EPMM to manage employee mobile devices, these vulnerabilities represent a path to mass credential theft and device compromise.</p> <p><strong>ATT&amp;CK:</strong> T1190, T1059, T1078</p> <h3><strong>3. REDBIKE Ransomware: New Family, Familiar Playbook</strong></h3> <p>A previously untracked ransomware family called <strong>REDBIKE</strong> is being deployed through exploitation of SonicWall VPN appliances. Government is explicitly listed as a target vertical.</p> <p>This follows the broader trend of ransomware operators abandoning phishing in favor of network appliance exploitation &mdash; the same pattern seen with BeyondTrust and Ivanti. SonicWall devices are widely deployed across state agencies and county governments, often managed by third-party MSPs.</p> <p>The REDBIKE campaign joins an already crowded ransomware landscape targeting state/local government: <strong>DragonForce</strong>, <strong>Qilin</strong>, <strong>Rhysida</strong>, <strong>Medusa</strong>, <strong>INC Ransom/Lynx</strong>, <strong>NightSpire</strong>, <strong>SafePay</strong>, <strong>Everest</strong>, and <strong>AiLock</strong> all maintain government in their target verticals.</p> <p><strong>ATT&amp;CK:</strong> T1190, T1133, T1486, T1490</p> <h3><strong>4. BlueNoroff (DPRK): Fake Meeting Infrastructure Going Live</strong></h3> <p>Three fresh command-and-control domains were observed mimicking video conferencing platforms:</p> <ul> <li>web04meet[.]top</li> <li>web12teams[.]com</li> <li>web21zoom[.]com</li> </ul> <p><strong>BlueNoroff</strong> (a sub-group of North Korea&rsquo;s Lazarus Group) is known for financially motivated attacks and social engineering via fake meeting invitations. The naming convention strongly suggests an imminent campaign using fake video conference links to deliver malware or harvest credentials.</p> <p>State government employees &mdash; particularly those in finance, procurement, and executive roles &mdash; are likely targets for this type of social engineering.</p> <p><strong>ATT&amp;CK:</strong> T1566.002, T1204.001, T1071.001, T1583.001</p> <h3><strong>5. Iranian Espionage: Broad and Persistent</strong></h3> <p>A suspected Iranian espionage campaign is targeting government, energy, telecommunications, and utilities across <strong>17 countries</strong> using custom backdoors alongside legitimate remote access tools. This tradecraft is consistent with <strong>MuddyWater</strong> (Iranian MOIS) operations.</p> <p>Separately, <strong>CyberAv3ngers</strong> (IRGC-CEC) continues exploiting Rockwell PLCs at U.S. water facilities, and MuddyWater has deployed a blockchain-based C2 framework called <strong>&ldquo;ChainShell&rdquo;</strong> against government targets &mdash; making attribution more difficult through decentralized infrastructure.</p> <p><strong>ATT&amp;CK:</strong> T1219, T1059.001, T1105, T1078, T1071.001</p> <h3><strong>6. ICS/SCADA: Municipal Infrastructure at Risk</strong></h3> <p>Four new CISA ICS advisories affect systems common in state and local government:</p> <table> <thead> <tr> <th> <p>Advisory</p> </th> <th> <p>Product</p> </th> <th> <p>Relevance to State Government</p> </th> </tr> </thead> <tbody> <tr> <td> <p>ICSA-26-106-04</p> </td> <td> <p>AVEVA Pipeline Simulation</p> </td> <td> <p>Pipeline infrastructure oversight</p> </td> </tr> <tr> <td> <p>ICSA-26-106-02</p> </td> <td> <p>Horner Cscape / XL4/XL7 PLC</p> </td> <td> <p>Municipal water/wastewater, building automation</p> </td> </tr> <tr> <td> <p>ICSA-26-106-01</p> </td> <td> <p>Delta Electronics ASDA-Soft</p> </td> <td> <p>Manufacturing, building automation</p> </td> </tr> <tr> <td> <p>ICSA-26-106-03</p> </td> <td> <p>Anviz Biometric Access Control</p> </td> <td> <p><strong>State government physical security installations</strong></p> </td> </tr> </tbody> </table> <p>The Anviz advisory is particularly concerning &mdash; vulnerabilities allow reconnaissance and capture/decryption of sensitive data from biometric access control and time-attendance systems installed in government buildings.</p> <h2><strong>Predictive Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Scenario</p> </th> <th> <p>Probability</p> </th> <th> <p>Timeframe</p> </th> <th> <p>Basis</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Additional exploitation campaigns emerge for CVE-2026-20127 (Cisco SD-WAN) as PoC code circulates</p> </td> <td> <p><strong>&gt;70%</strong></p> </td> <td> <p>7&ndash;14 days</p> </td> <td> <p>Maximum severity + government targeting + CISA KEV listing drives rapid weaponization</p> </td> </tr> <tr> <td> <p>BlueNoroff fake meeting domains used in targeted spearphishing against government/financial sector</p> </td> <td> <p><strong>40&ndash;60%</strong></p> </td> <td> <p>7&ndash;14 days</p> </td> <td> <p>Infrastructure is fresh (observed 2026-04-20); BlueNoroff historically moves quickly from infrastructure setup to campaign launch</p> </td> </tr> <tr> <td> <p>REDBIKE ransomware expands targeting as SonicWall exploitation techniques are shared in criminal forums</p> </td> <td> <p><strong>40&ndash;60%</strong></p> </td> <td> <p>14&ndash;30 days</p> </td> <td> <p>Ransomware operators routinely share/sell initial access; SonicWall is ubiquitous in government</p> </td> </tr> <tr> <td> <p>Unattributed Cisco SD-WAN campaign attributed to Chinese APT (Volt Typhoon or affiliate)</p> </td> <td> <p><strong>25&ndash;40%</strong></p> </td> <td> <p>30&ndash;60 days</p> </td> <td> <p>Capability profile matches Volt Typhoon; attribution typically lags exploitation by weeks</p> </td> </tr> <tr> <td> <p>Ransomware incident at a U.S. state or local government agency via network appliance exploitation</p> </td> <td> <p><strong>&gt;60%</strong></p> </td> <td> <p>30 days</p> </td> <td> <p>Multiple active campaigns (REDBIKE, INC Ransom, DragonForce) targeting government via appliance exploitation; attack surface is large and patch velocity is typically slow</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>Immediate Detection Priorities</strong></h3> <p><strong>Hunt Hypothesis 1: Cisco SD-WAN Unauthorized Access</strong></p> <ul> <li><strong>ATT&amp;CK:</strong> T1190, T1078, T1565.002, T1599</li> <li><strong>What to look for:</strong> Unexpected NETCONF sessions to vSmart/vManage controllers, new admin accounts created on SD-WAN management plane, configuration changes not matching change management tickets, unusual routing policy modifications</li> <li><strong>Detection:</strong> Alert on any vManage/vSmart authentication events from non-whitelisted IPs; monitor NETCONF audit logs for configuration pushes outside maintenance windows</li> <li><strong>Investigation:</strong> If Cisco SD-WAN is deployed, immediately audit all admin accounts and recent configuration changes. Compare running config against last known-good baseline.</li> </ul> <p><strong>Hunt Hypothesis 2: Ivanti EPMM Exploitation</strong></p> <ul> <li><strong>ATT&amp;CK:</strong> T1190, T1059, T1078</li> <li><strong>What to look for:</strong> Unexpected processes spawned by Ivanti EPMM application server, web shell artifacts, new device enrollment policies pushed without authorization, anomalous API calls to EPMM management interface</li> <li><strong>Detection:</strong> Monitor Ivanti EPMM access logs for exploitation signatures; alert on command execution from web application context</li> <li><strong>Investigation:</strong> Review all EPMM-managed device policies for unauthorized modifications; check for new admin accounts</li> </ul> <p><strong>Hunt Hypothesis 3: SonicWall VPN Compromise (REDBIKE precursor)</strong></p> <ul> <li><strong>ATT&amp;CK:</strong> T1190, T1133, T1486, T1490</li> <li><strong>What to look for:</strong> Unusual VPN session durations, VPN connections from anomalous geolocations, lateral movement following VPN authentication, volume shadow copy deletion, backup system access</li> <li><strong>Detection:</strong> Correlate SonicWall VPN authentication logs with impossible travel analysis; alert on post-VPN lateral movement to backup infrastructure</li> <li><strong>Investigation:</strong> Audit SonicWall firmware versions across all deployments; check for indicators of pre-ransomware staging (Cobalt Strike beacons, credential dumping)</li> </ul> <p><strong>Hunt Hypothesis 4: BlueNoroff Social Engineering</strong></p> <ul> <li><strong>ATT&amp;CK:</strong> T1566.002, T1204.001, T1071.001</li> <li><strong>What to look for:</strong> DNS queries or web proxy hits to fake meeting domains; calendar invitations from external senders with links to non-standard video conferencing URLs; executable downloads following meeting link clicks</li> <li><strong>Detection:</strong> DNS/proxy blocking and alerting for known C2 domains (see IOC table below); email gateway rules flagging meeting invitations with URLs containing &ldquo;web##meet/teams/zoom&rdquo; patterns</li> <li><strong>Investigation:</strong> If any employee clicked a suspicious meeting link, isolate endpoint and check for persistence mechanisms</li> </ul> <h3><strong>IOC Blocking Table</strong></h3> <table> <thead> <tr> <th> <p>IOC</p> </th> <th> <p>Type</p> </th> <th> <p>Context</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>web04meet[.]top</p> </td> <td> <p>Domain</p> </td> <td> <p>BlueNoroff (DPRK) C2 &mdash; fake meeting infrastructure</p> </td> <td> <p>Block at DNS/proxy; alert on historical lookups</p> </td> </tr> <tr> <td> <p>web12teams[.]com</p> </td> <td> <p>Domain</p> </td> <td> <p>BlueNoroff (DPRK) C2 &mdash; fake Teams impersonation</p> </td> <td> <p>Block at DNS/proxy; alert on historical lookups</p> </td> </tr> <tr> <td> <p>web21zoom[.]com</p> </td> <td> <p>Domain</p> </td> <td> <p>BlueNoroff (DPRK) C2 &mdash; fake Zoom impersonation</p> </td> <td> <p>Block at DNS/proxy; alert on historical lookups</p> </td> </tr> <tr> <td> <p>rvtootsacad[.]com</p> </td> <td> <p>Domain</p> </td> <td> <p>UNC2465 / DARKSIDE precursor activity</p> </td> <td> <p>Block at DNS/proxy; monitor for resolution attempts</p> </td> </tr> <tr> <td> <p>a.erforias[.]cam</p> </td> <td> <p>Domain</p> </td> <td> <p>APT infrastructure &mdash; high severity</p> </td> <td> <p>Block at DNS/proxy</p> </td> </tr> </tbody> </table> <h3><strong>ATT&amp;CK Technique Coverage Check</strong></h3> <table> <thead> <tr> <th> <p>Technique</p> </th> <th> <p>Name</p> </th> <th> <p>Relevant Campaign</p> </th> <th> <p>Detection Status</p> </th> </tr> </thead> <tbody> <tr> <td> <p>T1190</p> </td> <td> <p>Exploit Public-Facing Application</p> </td> <td> <p>Cisco SD-WAN, Ivanti EPMM, SonicWall, BeyondTrust</p> </td> <td> <p><strong>Priority 1</strong> &mdash; ensure appliance logs are collected and monitored</p> </td> </tr> <tr> <td> <p>T1078</p> </td> <td> <p>Valid Accounts</p> </td> <td> <p>Post-exploitation across all campaigns</p> </td> <td> <p>Monitor for new privileged accounts, impossible travel</p> </td> </tr> <tr> <td> <p>T1133</p> </td> <td> <p>External Remote Services</p> </td> <td> <p>SonicWall/REDBIKE</p> </td> <td> <p>VPN log analysis, geo-anomaly detection</p> </td> </tr> <tr> <td> <p>T1566.002</p> </td> <td> <p>Spearphishing Link</p> </td> <td> <p>BlueNoroff fake meetings</p> </td> <td> <p>Email gateway + DNS blocking</p> </td> </tr> <tr> <td> <p>T1219</p> </td> <td> <p>Remote Access Software</p> </td> <td> <p>Iranian espionage</p> </td> <td> <p>Monitor for unauthorized RMM tool installations</p> </td> </tr> <tr> <td> <p>T1486</p> </td> <td> <p>Data Encrypted for Impact</p> </td> <td> <p>REDBIKE ransomware</p> </td> <td> <p>Canary files, volume shadow copy monitoring</p> </td> </tr> <tr> <td> <p>T1490</p> </td> <td> <p>Inhibit System Recovery</p> </td> <td> <p>REDBIKE ransomware</p> </td> <td> <p>Alert on backup deletion, VSS manipulation</p> </td> </tr> <tr> <td> <p>T1565.002</p> </td> <td> <p>Transmitted Data Manipulation</p> </td> <td> <p>Cisco SD-WAN</p> </td> <td> <p>NETCONF audit logging, config baseline comparison</p> </td> </tr> <tr> <td> <p>T1599</p> </td> <td> <p>Network Boundary Bridging</p> </td> <td> <p>Cisco SD-WAN</p> </td> <td> <p>Routing table monitoring, unexpected tunnel creation</p> </td> </tr> </tbody> </table> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services (State Treasury, Revenue, Procurement)</strong></h3> <ul> <li><strong>Primary threat:</strong> BlueNoroff credential harvesting via fake meeting invitations; Ivanti EPMM exploitation for mobile device access to financial systems</li> <li><strong>Action:</strong> Brief finance and procurement staff on fake video conference social engineering; ensure mobile devices accessing financial systems are managed through patched EPMM instances; implement transaction verification procedures that don&rsquo;t rely solely on email/mobile approval</li> </ul> <h3><strong>Energy (State Energy Regulatory Agencies, Utility Oversight)</strong></h3> <ul> <li><strong>Primary threat:</strong> Iranian espionage campaign targeting energy/utilities across 17 countries; CyberAv3ngers targeting water facility PLCs; AVEVA pipeline simulation advisory</li> <li><strong>Action:</strong> Coordinate with regulated utilities on Iranian APT indicators; verify that SCADA/ICS systems under state oversight have applied relevant CISA advisories; ensure OT networks are segmented from IT networks with monitored jump boxes</li> </ul> <h3><strong>Healthcare (State Health Agencies, Medicaid Systems)</strong></h3> <ul> <li><strong>Primary threat:</strong> INC Ransom/Lynx confirmed hitting NHS hospital (public healthcare analog); DPRK Axios NPM supply chain compromise targeting healthcare sector</li> <li><strong>Action:</strong> Verify that healthcare-adjacent state systems (Medicaid, public health databases) have offline backup capability tested within the last 30 days; audit NPM dependencies in any custom web applications; ensure ransomware playbooks include healthcare data breach notification procedures</li> </ul> <h3><strong>Government (All State Agencies)</strong></h3> <ul> <li><strong>Primary threat:</strong> Cisco SD-WAN exploitation (CVE-2026-20127) &mdash; network fabric takeover; Ivanti EPMM exploitation &mdash; mobile fleet compromise; REDBIKE ransomware via SonicWall; Iranian and Russian espionage</li> <li><strong>Action:</strong> Emergency patch verification for Cisco SD-WAN, Ivanti EPMM, BeyondTrust, and SonicWall across all agencies; implement management-plane access restrictions on all network infrastructure; activate heightened monitoring for lateral movement and privilege escalation</li> </ul> <h3><strong>Aviation/Logistics (State DOT, Port Authorities, Transit)</strong></h3> <ul> <li><strong>Primary threat:</strong> Ivanti EPMM Campaign 2 explicitly targets transportation sector; Cisco SD-WAN exploitation could disrupt transit network connectivity; Delta Electronics ASDA-Soft advisory affects servo drives in transportation automation</li> <li><strong>Action:</strong> Verify that transportation management systems are not accessible via compromised SD-WAN fabric; audit Ivanti EPMM deployments managing field worker mobile devices; review Delta Electronics servo drive deployments in transit automation systems</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>IMMEDIATE (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>1</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Verify patch status of ALL Cisco Catalyst SD-WAN Controller (vSmart) and SD-WAN Manager (vManage) instances for CVE-2026-20127.</strong> If unpatched: restrict management plane access to trusted IPs only, enable NETCONF audit logging, and compare running configuration against last known-good baseline.</p> </td> </tr> <tr> <td> <p>2</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Confirm Ivanti EPMM instances are patched for CVE-2026-1281 and CVE-2026-1340.</strong> Two distinct exploitation campaigns now target government. If EPMM is internet-facing and unpatched, take offline pending emergency patching.</p> </td> </tr> <tr> <td> <p>3</p> </td> <td> <p>SOC</p> </td> <td> <p><strong>Block BlueNoroff C2 domains</strong> (web04meet[.]top, web12teams[.]com, web21zoom[.]com, rvtootsacad[.]com, a.erforias[.]cam) at DNS resolvers and web proxies. Run retroactive DNS query analysis for any historical resolution attempts.</p> </td> </tr> <tr> <td> <p>4</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Verify BeyondTrust Remote Support and Privileged Remote Access patched for CVE-2026-1731</strong> (CVSS 9.8, confirmed exploitation with Meterpreter payload delivery).</p> </td> </tr> </tbody> </table> <h3><strong>7-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>5</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Audit all SonicWall VPN appliance firmware versions</strong> across state agencies and county deployments. REDBIKE ransomware is actively exploiting SonicWall for government targeting. Coordinate with MSP vendors managing SonicWall devices for downstream agencies.</p> </td> </tr> <tr> <td> <p>6</p> </td> <td> <p>Physical Security / IT Ops</p> </td> <td> <p><strong>Inventory all Anviz biometric access control systems</strong> in state facilities. CISA advisory ICSA-26-106-03 warns of data capture/decryption vulnerabilities. Isolate Anviz devices from production networks pending vendor patch.</p> </td> </tr> <tr> <td> <p>7</p> </td> <td> <p>SOC</p> </td> <td> <p><strong>Deploy hunting queries</strong> for unauthorized NETCONF sessions, new admin account creation on network infrastructure, and configuration changes outside maintenance windows.</p> </td> </tr> <tr> <td> <p>8</p> </td> <td> <p>Security Awareness</p> </td> <td> <p><strong>Issue targeted advisory to finance, procurement, and executive staff</strong> regarding fake video conference invitation social engineering (BlueNoroff campaign). Include examples of suspicious domain patterns.</p> </td> </tr> </tbody> </table> <h3><strong>30-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>9</p> </td> <td> <p>CISO</p> </td> <td> <p><strong>Commission a network appliance attack surface assessment.</strong> Catalog all internet-facing SonicWall, Fortinet, Ivanti, BeyondTrust, and Cisco SD-WAN instances across state and county networks. The dominant initial access trend is now perimeter appliance exploitation &mdash; defensive investment must shift accordingly.</p> </td> </tr> <tr> <td> <p>10</p> </td> <td> <p>CISO</p> </td> <td> <p><strong>Establish network appliance patch SLA</strong> &mdash; critical CVEs on internet-facing appliances patched within 48 hours, not the 30-day window acceptable for endpoints.</p> </td> </tr> <tr> <td> <p>11</p> </td> <td> <p>IR Team</p> </td> <td> <p><strong>Update ransomware incident response playbooks</strong> to account for network appliance initial access (not just phishing). Include SonicWall, Ivanti, and BeyondTrust compromise scenarios with specific forensic evidence locations.</p> </td> </tr> <tr> <td> <p>12</p> </td> <td> <p>CISO / CIO</p> </td> <td> <p><strong>Evaluate SD-WAN architecture resilience</strong> &mdash; if Cisco Catalyst SD-WAN is deployed, assess whether a compromised controller could be used for traffic interception or network-wide disruption. Consider management plane segmentation and out-of-band management access.</p> </td> </tr> </tbody> </table> <h2><strong>Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>The data is unambiguous: <strong>adversaries have moved from your inbox to your network edge.</strong> Four of the five most critical active campaigns target perimeter appliances &mdash; Cisco SD-WAN, Ivanti EPMM, BeyondTrust, and SonicWall. These devices often sit outside the visibility of endpoint detection tools, are patched on slower cycles than workstations, and when compromised, grant access that bypasses every downstream security control.</p> <p>For state government IT leaders, this demands three strategic responses:</p> <ol> <li><strong>Treat network appliance patching with the same urgency as zero-day endpoint patching.</strong> A CVSS 10.0 on your SD-WAN controller is more dangerous than a CVSS 10.0 on a single workstation &mdash; it affects your entire network fabric.</li> <li><strong>Maintain a real-time inventory of every internet-facing appliance with its firmware version.</strong> You cannot patch what you cannot find. Many state agencies have SonicWall or Fortinet devices deployed by MSPs that don&rsquo;t appear in centralized asset inventories.</li> <li><strong>Assume your perimeter will be breached and invest in detection of post-exploitation lateral movement.</strong> Network segmentation, privileged access monitoring, and backup integrity verification are your last lines of defense when an appliance is compromised.</li> </ol> <p>The threat actors &mdash; from Volt Typhoon pre-positioning in network infrastructure to REDBIKE ransomware operators exploiting SonicWall &mdash; have already adapted their playbooks. Your defensive posture must adapt with equal urgency.</p>

FEATURED RESOURCES

April 20, 2026
Anomali Cyber Watch

Iran’s Cyber War Didn’t Stop When the Bombs Did — Why the Ceasefire Is the Most Dangerous Phase Yet

Read More
April 20, 2026
Anomali Cyber Watch
Public Sector

Network Appliances Under Siege: State Government IT Faces Maximum-Severity Exploitation Wave

Read More
April 14, 2026
Anomali Cyber Watch

When Silence Is the Loudest Warning: Iran's Cyber Operations Enter a Dangerous New Phase

Read More
Explore All