<p><strong>Threat Assessment Level: ELEVATED, trending HIGHER</strong></p>
<p><em>Maintained from prior cycle (ELEVATED since March 26). The convergence of an expanding supply chain campaign across eight software ecosystems, three municipal ransomware incidents in seven days, and CISA's degraded operational capacity justifies sustained ELEVATED status with upward pressure. Escalation to HIGH is likely if additional municipal ransomware incidents surface or TeamPCP compromises additional packages this week.</em></p>
<p>State government IT leaders face a compounding threat environment this week that demands immediate attention. A single supply chain actor has now poisoned eight open-source software ecosystems — including tools your agencies almost certainly use. Municipal and county governments are being destroyed by ransomware at a pace of one every two days. And the federal agency you've relied on for threat intelligence and incident response has been forced into a reactive-only posture.</p>
<p>None of these threats exist in isolation. Together, they represent a structural shift in the risk calculus for every state CIO and CISO in the country.</p>
<h2><strong>What Changed </strong></h2>
<p>The past week brought five developments that directly affect state government cybersecurity posture:</p>
<ol>
<li><strong>TeamPCP supply chain campaign expanded to its eighth ecosystem.</strong> The threat actor compromised the telnyx Python SDK on PyPI — a package downloaded 742,000 times in the past month — using a never-before-seen technique: hiding credential-stealing payloads inside WAV audio files. This is the same actor behind the Trivy vulnerability scanner compromise (CVE-2026-33634), which CISA added to its Known Exploited Vulnerabilities catalog on March 26.</li>
<li><strong>A critical AI platform vulnerability was weaponized in 20 hours.</strong> CVE-2026-33017, an unauthenticated remote code execution flaw in Langflow (CVSS 9.8), was exploited before most organizations could even read the advisory. Attackers built a working exploit solely from the vulnerability description — no proof-of-concept code was needed.</li>
<li><strong>Jackson County, Indiana Sheriff's Office was destroyed by ransomware.</strong> Their systems were so thoroughly compromised that the department is "starting from the ground up." This is the third municipal/county ransomware incident in seven days, following Foster City, California (still under a declared state of emergency) and a Maine mental health agency attributed to the Qilin ransomware group.</li>
<li><strong>Four CISA ICS advisories dropped in 24 hours</strong>, covering WAGO industrial switches, Schneider Electric Foxboro DCS systems, Schneider Plant iT, and PTC Windchill. The PTC vulnerability (CVE-2026-4681) is a critical remote code execution flaw with no patch available — German police physically visited companies overnight to warn them.</li>
<li><strong>CISA has been forced into a reactive-only posture</strong> due to the DHS shutdown. Proactive threat hunting, directive issuance, and state/local support have been curtailed. State governments must now assume greater self-reliance for threat detection and incident response.</li>
<li><strong>Nation-state cyber operations are running on multiple simultaneous fronts.</strong> Iranian actors (Handala/Void Manticore, Pay2Key, MuddyWater) are conducting destructive, ransomware, and espionage operations against U.S. targets. Russian intelligence services are actively phishing government personnel via Signal and WhatsApp. Chinese pre-positioning actors Volt Typhoon and Salt Typhoon have gone quiet — a posture consistent with long-term persistence, not departure.</li>
</ol>
<h2><strong>Threat Timeline </strong></h2>
<table>
<thead>
<tr>
<th>
<p>Date</p>
</th>
<th>
<p>Event</p>
</th>
<th>
<p>Impact</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Mar 20–21</p>
</td>
<td>
<p>Foster City, CA ransomware attack</p>
</td>
<td>
<p>City declares state of emergency; systems remain offline</p>
</td>
</tr>
<tr>
<td>
<p>Mar 22</p>
</td>
<td>
<p>Foster City state of emergency formally declared</p>
</td>
<td>
<p>Municipal services disrupted; recovery ongoing</p>
</td>
</tr>
<tr>
<td>
<p>Mar 23</p>
</td>
<td>
<p>FBI confirms Iranian attribution for Handala/Void Manticore Stryker wiper attack</p>
</td>
<td>
<p>12-petabyte destructive operation attributed to IRGC-linked actors</p>
</td>
</tr>
<tr>
<td>
<p>Mar 23</p>
</td>
<td>
<p>DarkSword iOS exploit kit leaked on GitHub</p>
</td>
<td>
<p>Mobile exploitation risk elevated for government personnel</p>
</td>
</tr>
<tr>
<td>
<p>Mar 25</p>
</td>
<td>
<p>Qilin ransomware hits Maine mental health agency</p>
</td>
<td>
<p>Healthcare/government crossover targeting confirmed</p>
</td>
</tr>
<tr>
<td>
<p>Mar 25</p>
</td>
<td>
<p>CISA forced into reactive posture amid DHS shutdown</p>
</td>
<td>
<p>Proactive federal cyber operations halted</p>
</td>
</tr>
<tr>
<td>
<p>Mar 26</p>
</td>
<td>
<p>Pay2Key ransomware re-emerges with 3-hour encryption capability</p>
</td>
<td>
<p>Iran-linked ransomware with dramatically accelerated encryption speed</p>
</td>
</tr>
<tr>
<td>
<p>Mar 26</p>
</td>
<td>
<p>CISA adds CVE-2026-33634 (Trivy) to KEV catalog</p>
</td>
<td>
<p>Federal remediation deadline: April 9, 2026</p>
</td>
</tr>
<tr>
<td>
<p>Mar 26</p>
</td>
<td>
<p>CISA adds CVE-2026-33017 (Langflow, CVSS 9.8) to KEV catalog</p>
</td>
<td>
<p>Exploited within 20 hours of disclosure</p>
</td>
</tr>
<tr>
<td>
<p>Mar 26</p>
</td>
<td>
<p>CISA publishes 4 ICS advisories (WAGO, Schneider ×2, PTC)</p>
</td>
<td>
<p>OT/ICS exposure across water, facilities, and manufacturing</p>
</td>
</tr>
<tr>
<td>
<p>Mar 26</p>
</td>
<td>
<p>Active Ivanti EPMM exploitation confirmed targeting government</p>
</td>
<td>
<p>Endpoint management infrastructure under direct attack</p>
</td>
</tr>
<tr>
<td>
<p>Mar 27</p>
</td>
<td>
<p>TeamPCP compromises telnyx PyPI package using WAV steganography</p>
</td>
<td>
<p>742K downloads; 8th ecosystem in supply chain cascade</p>
</td>
</tr>
<tr>
<td>
<p>Mar 27</p>
</td>
<td>
<p>Jackson County, IN Sheriff's Office discloses ransomware destruction</p>
</td>
<td>
<p>Third municipal ransomware incident in 7 days</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Key Threat Analysis </strong></h2>
<h3><strong>The TeamPCP Supply Chain Cascade: Eight Ecosystems and Counting</strong></h3>
<p>TeamPCP is the most operationally significant supply chain threat actor active today. Over the past several weeks, this group has systematically compromised trusted open-source packages across <strong>eight software ecosystems</strong>: Trivy (vulnerability scanner), LiteLLM (AI proxy), Docker Hub, VS Code extensions, PyPI (telnyx), npm, Checkmarx KICS, and GitHub Actions.</p>
<p>The latest compromise — the telnyx Python SDK versions 4.87.1 and 4.87.2 — introduces a technique we have not previously seen in supply chain attacks: <strong>WAV audio steganography</strong>. The malicious package downloads what appears to be an innocuous audio file (ringtone.wav), then extracts an encoded credential-stealing payload hidden within the audio frames using XOR decryption. On Linux and macOS, harvested secrets (SSH keys, cloud credentials, API keys, database passwords) are encrypted with AES-256-CBC and RSA-4096 before exfiltration. On Windows, a persistent binary disguised as msbuild.exe is dropped into the Startup folder.</p>
<p><strong>Why this matters for state government:</strong> State agencies running any Python-based automation, data analytics, or AI experimentation are potential victims. The compromised Trivy scanner — now on the CISA KEV — is widely used in CI/CD pipelines for container security scanning. If your DevOps teams use Trivy, they may have been running a compromised version that was actively exfiltrating their CI/CD secrets.</p>
<p>A forensic indicator of successful TeamPCP compromise is the presence of a repository named tpcp-docs in your GitHub organization. The shared RSA-4096 public key and tpcp.tar.gz exfiltration artifact link all eight ecosystem compromises to the same actor.</p>
<h3><strong>Langflow: The 20-Hour Weaponization Window</strong></h3>
<p>CVE-2026-33017 represents a new benchmark in exploit velocity. This unauthenticated remote code execution vulnerability in Langflow — an AI agent and workflow building platform — carries a CVSS score of 9.8. Attackers send crafted Python code via HTTP POST to an unauthenticated API endpoint (/api/v1/build_public_tmp/{flow_id}/flow), which passes it directly to Python's exec() function. No authentication. No input validation. Full code execution.</p>
<p>The critical detail: <strong>attackers weaponized this vulnerability within 20 hours of the advisory being published</strong>, working solely from the vulnerability description without a published proof-of-concept. The traditional "patch window" — the time between disclosure and exploitation — has effectively collapsed to less than a business day for critical vulnerabilities.</p>
<p><strong>Why this matters for state government:</strong> Many state agencies are experimenting with AI workflow automation as part of modernization initiatives. Any Langflow instance running a version prior to 1.9.0 with a public-facing endpoint is trivially exploitable. Given the 20-hour weaponization timeline, if you haven't patched already, assume scanning has occurred.</p>
<h3><strong>Municipal Ransomware: Three Incidents in Seven Days</strong></h3>
<p>The ransomware campaign against municipal and county government is accelerating:</p>
<ul>
<li><strong>Foster City, CA</strong> — Declared a state of emergency on March 22. Systems remain offline. No attribution.</li>
<li><strong>Maine mental health agency</strong> — Attributed to the <strong>Qilin</strong> ransomware group on March 25. Healthcare-government crossover targeting.</li>
<li><strong>Jackson County, IN Sheriff's Office</strong> — Disclosed March 27. Systems completely destroyed. "We pretty much have to start up from the ground up again." No attribution.</li>
</ul>
<p>The timing is not coincidental. Tax season stretches IT resources thin across every level of government. Attackers know that budget cycles, filing deadlines, and seasonal staffing pressures create windows of reduced vigilance. Notably, neither Foster City nor Jackson County has been claimed on any known ransomware leak site — unusual, since most groups claim victims within 72 hours. This may indicate a newer or less-established group, or that ransom negotiations are ongoing.</p>
<h3><strong>Nation-State Activity: Iran's Multi-Modal Campaign</strong></h3>
<p>Iranian cyber operations against U.S. targets are running simultaneously across three distinct objectives:</p>
<table>
<thead>
<tr>
<th>
<p>Actor</p>
</th>
<th>
<p>Affiliation</p>
</th>
<th>
<p>Operation Type</p>
</th>
<th>
<p>Status</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>Handala / Void Manticore</strong></p>
</td>
<td>
<p>IRGC-linked</p>
</td>
<td>
<p>Destructive wiper (12 PB erased at Stryker)</p>
</td>
<td>
<p>FBI attribution confirmed Mar 23</p>
</td>
</tr>
<tr>
<td>
<p><strong>Pay2Key</strong></p>
</td>
<td>
<p>Iran-linked (possible Russian-speaking operator transition)</p>
</td>
<td>
<p>Ransomware (3-hour enterprise encryption)</p>
</td>
<td>
<p>Re-emerged Mar 26</p>
</td>
</tr>
<tr>
<td>
<p><strong>MuddyWater</strong></p>
</td>
<td>
<p>MOIS</p>
</td>
<td>
<p>Espionage (Dindoor campaign)</p>
</td>
<td>
<p>Active, ongoing</p>
</td>
</tr>
<tr>
<td>
<p><strong>Kimsuky</strong></p>
</td>
<td>
<p>North Korea / RGB</p>
</td>
<td>
<p>Government targeting via ConnectWise + PowerShell</p>
</td>
<td>
<p>Quiet since initial detection; burst pattern expected</p>
</td>
</tr>
</tbody>
</table>
<p>Additionally, FBI and CISA have warned that <strong>Russian intelligence services</strong> are conducting mass phishing campaigns targeting Signal and WhatsApp — messaging platforms increasingly used by government personnel for operational communications.</p>
<p>The <strong>Vapor Panda / Earth Estries</strong> (Chinese APT) threat model was updated on March 27 with confirmed government targeting. Meanwhile, <strong>Volt Typhoon</strong> and <strong>Salt Typhoon</strong> — Chinese pre-positioning actors documented inside U.S. critical infrastructure — have gone silent. This silence is not reassuring; these actors specialize in long-term persistence and may be in maintenance mode rather than having departed compromised networks.</p>
<h3><strong>OT/ICS: Four Advisories, One With No Patch</strong></h3>
<p>The batch of four CISA ICS advisories in 24 hours underscores the expanding attack surface in operational technology:</p>
<table>
<thead>
<tr>
<th>
<p>Advisory</p>
</th>
<th>
<p>Product</p>
</th>
<th>
<p>Risk</p>
</th>
<th>
<p>Patch Status</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>ICSA-26-085-01</p>
</td>
<td>
<p>WAGO Industrial Managed Switches</p>
</td>
<td>
<p>Unauthenticated CLI escape → full system control</p>
</td>
<td>
<p>Mitigations available</p>
</td>
</tr>
<tr>
<td>
<p>ICSA-26-083-02</p>
</td>
<td>
<p>Schneider Electric EcoStruxure Foxboro DCS</p>
</td>
<td>
<p>DCS workstation/server vulnerability</p>
</td>
<td>
<p>Patch available</p>
</td>
</tr>
<tr>
<td>
<p>ICSA-26-083-03</p>
</td>
<td>
<p>Schneider Electric Plant iT/Brewmaxx</p>
</td>
<td>
<p>Privilege escalation → RCE</p>
</td>
<td>
<p>Patch available</p>
</td>
</tr>
<tr>
<td>
<p>CVE-2026-4681</p>
</td>
<td>
<p>PTC Windchill/FlexPLM</p>
</td>
<td>
<p>Critical deserialization RCE</p>
</td>
<td>
<p><strong>No patch available</strong></p>
</td>
</tr>
</tbody>
</table>
<p>The PTC Windchill situation is particularly alarming. German police physically visited companies at night to warn them — a response that suggests intelligence agencies believe exploitation is imminent or already occurring. Any state agency using PTC Windchill or FlexPLM for product lifecycle management must verify these systems are not internet-accessible immediately.</p>
<h2><strong>Predictive Analysis: What Comes Next</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Probability</p>
</th>
<th>
<p>Prediction</p>
</th>
<th>
<p>Basis</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>>75% (HIGH)</strong></p>
</td>
<td>
<p>TeamPCP will compromise additional PyPI or npm packages within 7 days</p>
</td>
<td>
<p>Operational tempo is accelerating — telnyx was published the same day as the LiteLLM bulletin. The actor is iterating faster than defenders can respond.</p>
</td>
</tr>
<tr>
<td>
<p><strong>>75% (HIGH)</strong></p>
</td>
<td>
<p>Additional municipal/county ransomware incidents will surface this week</p>
</td>
<td>
<p>Three incidents in seven days during tax season, when IT staff are stretched thinnest, suggests opportunistic targeting of under-resourced local governments.</p>
</td>
</tr>
<tr>
<td>
<p><strong>50–75% (MODERATE)</strong></p>
</td>
<td>
<p>Langflow exploitation will be adopted by ransomware initial access brokers</p>
</td>
<td>
<p>The trivial exploit complexity (unauthenticated HTTP POST → exec()) and 20-hour weaponization window make this an attractive entry point for financially motivated actors.</p>
</td>
</tr>
<tr>
<td>
<p><strong>50–75% (MODERATE)</strong></p>
</td>
<td>
<p>PTC Windchill CVE-2026-4681 will see in-the-wild exploitation before a patch is available</p>
</td>
<td>
<p>The German police response indicates intelligence community concern about imminent exploitation. No patch exists.</p>
</td>
</tr>
<tr>
<td>
<p><strong>25–50% (LOW-MODERATE)</strong></p>
</td>
<td>
<p>Iranian cyber operations will escalate against U.S. government targets</p>
</td>
<td>
<p>Pay2Key re-emergence, Handala wiper operations, and MuddyWater espionage are all active during the Iran conflict. Escalation triggers include geopolitical developments.</p>
</td>
</tr>
<tr>
<td>
<p><strong>25–50% (LOW-MODERATE)</strong></p>
</td>
<td>
<p>Volt Typhoon / Salt Typhoon will be discovered in additional U.S. critical infrastructure</p>
</td>
<td>
<p>Current silence from these Chinese pre-positioning actors is consistent with long-term persistence, not departure.</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>SOC Operational Guidance </strong></h2>
<h3><strong>Detection Priorities</strong></h3>
<ol>
<li><strong> TeamPCP Supply Chain Indicators</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Compromised Python packages are exfiltrating CI/CD secrets via encrypted channels to attacker infrastructure.</li>
<li><strong>ATT&CK Techniques:</strong> T1195.001 (Supply Chain Compromise), T1027.003 (Steganography), T1059.006 (Python), T1547.001 (Startup Folder Persistence), T1555 (Credentials from Password Stores), T1041 (Exfiltration Over C2), T1573.001 (Encrypted Channel)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>Outbound connections to 83.142.209[.]203:8080 (WAV steganography C2)</li>
<li>HTTP downloads of WAV files from non-CDN IP addresses followed by Python process execution</li>
<li>Presence of tpcp.tar.gz in network traffic or on disk (shared exfiltration artifact across all TeamPCP compromises)</li>
<li>Windows endpoints: msbuild.exe in user Startup folders (NOT the legitimate Microsoft Build Engine path)</li>
<li>Python code patterns: wave.open() combined with base64.b64decode() and subprocess.Popen() in package dependencies</li>
<li>GitHub: search for repository named tpcp-docs in your organization — presence indicates successful secret exfiltration</li>
</ul>
<ul>
<li><strong>Blocking action:</strong> Block 83.142.209[.]203 at all perimeter firewalls and add to threat intelligence blocklists.</li>
</ul>
<ol start="2">
<li><strong> Langflow Exploitation (CVE-2026-33017)</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Attackers are scanning for and exploiting unauthenticated Langflow API endpoints to achieve remote code execution.</li>
<li><strong>ATT&CK Techniques:</strong> T1190 (Exploit Public-Facing Application), T1059.006 (Python), T1068 (Exploitation for Privilege Escalation)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>HTTP POST requests to /api/v1/build_public_tmp/*/flow on any web-facing server</li>
<li>Unexpected Python exec() calls on servers running Langflow</li>
<li>New processes spawned by Langflow application processes</li>
</ul>
<ul>
<li><strong>Blocking action:</strong> WAF rules blocking suspicious POST payloads containing Python code to AI framework endpoints. If running Langflow < 1.9.0, take offline immediately.</li>
</ul>
<ol start="3">
<li><strong> Ransomware Precursor Activity</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Ransomware operators are targeting municipal/county agencies during tax season via credential compromise and exploiting known vulnerabilities.</li>
<li><strong>ATT&CK Techniques:</strong> T1078 (Valid Accounts), T1486 (Data Encrypted for Impact), T1490 (Inhibit System Recovery)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>Unusual RDP/VPN authentication patterns, especially outside business hours</li>
<li>Volume Shadow Copy deletion (vssadmin delete shadows)</li>
<li>Backup system access from non-backup accounts</li>
<li>Pay2Key indicators: 3-hour encryption timeline means detection must occur during initial access, not during encryption</li>
</ul>
<ul>
<li><strong>Defensive guidance:</strong> Validate offline backup integrity for all critical systems. Ensure backup accounts use separate credentials not accessible from the production domain.</li>
</ul>
<ol start="4">
<li><strong> Nation-State Messaging Platform Targeting</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Russian intelligence is phishing government personnel via Signal and WhatsApp to compromise operational communications.</li>
<li><strong>ATT&CK Techniques:</strong> T1566.002 (Spearphishing Link), T1539 (Steal Web Session Cookie)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>Linked device additions on Signal Desktop (indicator of session hijacking)</li>
<li>Tycoon2FA adversary-in-the-middle phishing targeting M365 sessions (T1557, T1539)</li>
<li>Silver Fox tax-themed phishing deploying ValleyRAT targeting government employees</li>
</ul>
<ul>
<li><strong>Defensive guidance:</strong> Brief all personnel on Signal/WhatsApp device-linking attacks. Review linked devices on all government messaging accounts.</li>
</ul>
<ol start="5">
<li><strong> OT/ICS Monitoring</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Unpatched WAGO switches and Schneider DCS systems in state-operated facilities are accessible to attackers who can escape restricted interfaces.</li>
<li><strong>ATT&CK (ICS):</strong> T0831 (Manipulation of Control), T0836 (Modify Parameter), T0855 (Unauthorized Command Message)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>CLI access attempts on WAGO managed switches from non-management VLANs</li>
<li>Unexpected configuration changes on Schneider Foxboro DCS workstations</li>
<li>Any internet-facing exposure of PTC Windchill/FlexPLM instances</li>
</ul>
<ul>
<li><strong>Defensive guidance:</strong> Verify network segmentation between IT and OT environments. Ensure ICS devices are not accessible from corporate networks without jump hosts.</li>
</ul>
<ol start="6">
<li><strong> Chinese APT Persistence (Absence-Based Hunt)</strong></li>
</ol>
<ul>
<li><strong>Hunt Hypothesis:</strong> Volt Typhoon and Salt Typhoon maintain persistent access to network edge devices (Cisco, Fortinet, Ivanti) using living-off-the-land techniques that evade signature-based detection.</li>
<li><strong>ATT&CK Techniques:</strong> T1133 (External Remote Services), T1036 (Masquerading), T1070 (Indicator Removal)</li>
<li><strong>What to monitor:</strong></li>
</ul>
<ul>
<li>Anomalous administrative access to network edge devices outside maintenance windows</li>
<li>Firmware integrity mismatches on Cisco, Fortinet, and Ivanti appliances</li>
<li>Unexpected scheduled tasks or cron jobs on network infrastructure</li>
</ul>
<ul>
<li><strong>Defensive guidance:</strong> This is a proactive hunt, not a reactive detection. Schedule a 30-day threat hunt across all network edge infrastructure.</li>
</ul>
<h2><strong>Sector-Specific Defensive Priorities</strong></h2>
<h3><strong>Financial Services (State Treasury, Revenue, Tax Systems)</strong></h3>
<p>Tax season creates peak exposure. State revenue and treasury systems processing millions of transactions are high-value ransomware targets.</p>
<ul>
<li><strong>Priority:</strong> Validate offline backups for all tax processing and revenue systems before April filing deadlines</li>
<li><strong>Threat:</strong> Pay2Key's 3-hour enterprise encryption capability means detection must happen at initial access — once encryption begins, the window is effectively closed</li>
<li><strong>Action:</strong> Enforce MFA on all remote access to financial systems; monitor for Tycoon2FA adversary-in-the-middle phishing targeting M365 credentials used by finance personnel</li>
<li><strong>Action:</strong> Audit Python dependencies in any tax processing automation for TeamPCP indicators (telnyx, trivy, litellm compromised versions)</li>
</ul>
<h3><strong>Energy (State-Operated Utilities, Power, Water/Wastewater)</strong></h3>
<p>CISA ICS advisories for WAGO switches and Schneider Foxboro DCS directly affect water treatment and utility SCADA environments.</p>
<ul>
<li><strong>Priority:</strong> Verify WAGO industrial managed switches are not accessible from corporate networks; apply CLI access restrictions per ICSA-26-085-01</li>
<li><strong>Threat:</strong> Volt Typhoon's documented pre-positioning in U.S. water and energy infrastructure remains a latent risk — silence does not mean absence</li>
<li><strong>Action:</strong> Patch Schneider Foxboro DCS workstations per ICSA-26-083-02; verify network segmentation between IT and OT</li>
<li><strong>Action:</strong> Conduct firmware integrity checks on all network edge devices (Cisco, Fortinet, Ivanti) in utility environments</li>
</ul>
<h3><strong>Healthcare (State Medicaid, Public Health, Mental Health Agencies)</strong></h3>
<p>The Qilin ransomware attack on a Maine mental health agency demonstrates direct targeting of healthcare-government crossover entities.</p>
<ul>
<li><strong>Priority:</strong> Review access controls and backup posture for all Medicaid and public health data systems</li>
<li><strong>Threat:</strong> Healthcare data combined with government PII creates maximum extortion leverage for ransomware operators</li>
<li><strong>Action:</strong> Ensure HIPAA-regulated systems have immutable backups tested within the last 30 days</li>
<li><strong>Action:</strong> Monitor for Silver Fox tax-themed phishing deploying ValleyRAT — this campaign specifically targets government employees and could pivot to healthcare data access</li>
</ul>
<h3><strong>Government (Executive Agencies, Law Enforcement, Courts)</strong></h3>
<p>Jackson County Sheriff's Office and Foster City demonstrate that law enforcement and municipal government are being targeted for complete destruction, not just data theft.</p>
<ul>
<li><strong>Priority:</strong> Activate state-level cyber mutual aid agreements proactively — do not wait for the next incident</li>
<li><strong>Threat:</strong> Kimsuky (North Korea) is targeting government entities via ConnectWise ScreenConnect and PowerShell tooling; many state agencies use ConnectWise through MSP relationships</li>
<li><strong>Action:</strong> Audit all ConnectWise ScreenConnect instances for unauthorized access; verify MSP connections are monitored and logged</li>
<li><strong>Action:</strong> Brief executive leadership on CISA's degraded operational capacity — state agencies must plan for reduced federal incident response support</li>
<li><strong>Action:</strong> Review all Ivanti EPMM deployments — active exploitation targeting government confirmed this week</li>
</ul>
<h3><strong>Aviation / Logistics (State DOT, Airports, Port Authorities)</strong></h3>
<p>State transportation and logistics infrastructure faces both ransomware and nation-state threats.</p>
<ul>
<li><strong>Priority:</strong> Verify PTC Windchill/FlexPLM installations (used in engineering and asset lifecycle management) are not internet-accessible — CVE-2026-4681 has no patch and German authorities consider exploitation imminent</li>
<li><strong>Threat:</strong> Iranian multi-modal operations (Handala wiper, Pay2Key ransomware, MuddyWater espionage) target infrastructure connected to defense and logistics supply chains</li>
<li><strong>Action:</strong> Segment transportation management systems from general-purpose IT networks</li>
<li><strong>Action:</strong> Review OT devices in traffic management and port control systems against CISA ICS advisories (WAGO, Schneider)</li>
</ul>
<h2><strong>Prioritized Defense Recommendations</strong></h2>
<h3><strong>Immediate (Within 24 Hours)</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Responsible Team</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Audit all Python environments for telnyx==4.87.1 or 4.87.2, compromised Trivy versions (v0.69.4, trivy-action 0.0.1–0.34.2, setup-trivy 0.2.0–0.2.6), and compromised LiteLLM packages. If found, <strong>rotate ALL secrets</strong> — environment variables, SSH keys, cloud credentials, API keys, database passwords — on affected systems.</p>
</td>
<td>
<p>IT Operations / DevOps</p>
</td>
</tr>
<tr>
<td>
<p>Block outbound connections to 83.142.209[.]203 on all perimeter firewalls and add to threat intelligence blocklists.</p>
</td>
<td>
<p>SOC</p>
</td>
</tr>
<tr>
<td>
<p>Inventory all Langflow instances across the enterprise. Any instance running a version prior to 1.9.0 with a public-facing endpoint must be taken offline or upgraded immediately.</p>
</td>
<td>
<p>IT Operations</p>
</td>
</tr>
<tr>
<td>
<p>Pin all GitHub Actions to full commit SHAs, not mutable version tags. Search for a repository named tpcp-docs in all organizational GitHub accounts — its presence indicates successful secret exfiltration by TeamPCP.</p>
</td>
<td>
<p>DevOps</p>
</td>
</tr>
<tr>
<td>
<p>Verify PTC Windchill/FlexPLM installations are not internet-accessible. Apply vendor mitigations for CVE-2026-4681 — no patch is available.</p>
</td>
<td>
<p>IT Operations</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>7-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Responsible Team</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Audit WAGO industrial managed switches for CLI access restrictions per ICSA-26-085-01. Verify Schneider Foxboro DCS workstations are patched per ICSA-26-083-02. Patch Schneider Plant iT per ICSA-26-083-03.</p>
</td>
<td>
<p>OT / Facilities</p>
</td>
</tr>
<tr>
<td>
<p>Deploy detection rules for WAV file downloads from non-CDN IPs followed by Python subprocess execution — this is the indicator of TeamPCP's novel steganographic payload delivery.</p>
</td>
<td>
<p>SOC</p>
</td>
</tr>
<tr>
<td>
<p>Brief executive leadership on CISA's degraded operational posture due to the DHS shutdown. Recommend the state assume greater self-reliance for threat detection and incident response, including evaluating contracted IR retainer capacity.</p>
</td>
<td>
<p>CISO / Executive</p>
</td>
</tr>
<tr>
<td>
<p>Validate offline backup integrity and recovery procedures for all critical agency systems. Test restoration of at least one critical system from backup.</p>
</td>
<td>
<p>IT Operations</p>
</td>
</tr>
<tr>
<td>
<p>Audit all ConnectWise ScreenConnect instances — both agency-owned and MSP-managed — for unauthorized access patterns. Verify logging is enabled and monitored.</p>
</td>
<td>
<p>SOC / IT Operations</p>
</td>
</tr>
<tr>
<td>
<p>Review and enforce MFA on all remote access pathways, with specific attention to VPN, RDP, and cloud admin portals.</p>
</td>
<td>
<p>IAM / IT Operations</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>30-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Responsible Team</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Conduct a proactive threat hunt for Volt Typhoon and Salt Typhoon living-off-the-land indicators across all network edge devices (Cisco, Fortinet, Ivanti). Absence of detected activity is not evidence of absence.</p>
</td>
<td>
<p>SOC / Threat Hunting</p>
</td>
</tr>
<tr>
<td>
<p>Evaluate adding Microsoft Defender Threat Intelligence feed to close the cloud/SaaS visibility gap. Current M365 threat monitoring is insufficient given active Tycoon2FA adversary-in-the-middle and ConsentFix Azure CLI attack campaigns.</p>
</td>
<td>
<p>CISO / SOC</p>
</td>
</tr>
<tr>
<td>
<p>Implement dependency hash verification and automated pinning for all open-source packages consumed in CI/CD pipelines. TeamPCP's expansion to eight ecosystems means manual auditing is no longer sustainable.</p>
</td>
<td>
<p>DevOps / Security Engineering</p>
</td>
</tr>
<tr>
<td>
<p>Activate or establish state-level cyber mutual aid agreements with neighboring states and county governments. Three municipal ransomware incidents in seven days during tax season demonstrates the need for pre-positioned response capacity.</p>
</td>
<td>
<p>CISO / Emergency Management</p>
</td>
</tr>
<tr>
<td>
<p>Commission an external assessment of OT/ICS network segmentation across all state-operated critical infrastructure (water, transportation, building management). Verify that IT-OT boundaries enforce defense-in-depth.</p>
</td>
<td>
<p>CISO / OT Security</p>
</td>
</tr>
<tr>
<td>
<p>Develop a contingency plan for sustained reduction in federal cybersecurity support. Evaluate whether the state needs to contract for capabilities previously provided by CISA (threat intelligence sharing, vulnerability coordination, incident response surge).</p>
</td>
<td>
<p>CISO / Executive</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Bottom Line </strong></h2>
<p>This week's intelligence paints a picture that goes beyond individual incidents. Three structural changes are reshaping the threat landscape for state government:</p>
<p><strong>First, the supply chain is now the dominant attack surface.</strong> TeamPCP's expansion to eight ecosystems — with novel steganographic delivery that evades traditional content inspection — means that every open-source package your agencies consume is a potential entry point. Manual auditing cannot keep pace with an adversary that is compromising new packages faster than defenders can catalog the last one. Automated dependency verification is no longer optional.</p>
<p><strong>Second, the exploit weaponization window has collapsed.</strong> When a CVSS 9.8 vulnerability is exploited within 20 hours of advisory publication — from the advisory text alone, without a proof-of-concept — the traditional patch cycle is broken. "Patch Tuesday, exploit Wednesday" has become "advisory morning, exploit evening." State agencies must move toward automated patching for internet-facing systems or accept that critical vulnerabilities will be exploited before human-driven patch processes can respond.</p>
<p><strong>Third, the federal-state cybersecurity relationship is changing.</strong> CISA's forced shift to a reactive-only posture is not a temporary disruption. Combined with ongoing uncertainty around CVE program funding and the absence of a confirmed CISA director, state governments face a future where federal threat intelligence, vulnerability coordination, and incident response support cannot be assumed. The states that build or contract for these capabilities now will be resilient. Those that wait will be the next Foster City or Jackson County.</p>
<p>The adversaries are not waiting. Neither should you.</p>